Question OFID-06
Describe or provide a reference to any other safeguards used to monitor for malicious activity.
Weight | 20 |
High Risk | No |
Required | Yes |
Compliant Answer | Yes |
Standard Guidance
Please detail your monitoring strategy
Answering "NO"
EDUCAUSE provides no guidance here
Answering "YES"
EDUCAUSE provides no guidance here
Reason for Question
This question is primarily focused on system(s) integrity and confidentiality. The vendor's response should clearly state the system(s) capabilities to properly monitor for (and alert for) malicious activity.
Follow-Up Inquiries
Follow-up inquiries for system monitoring will be institution/implementation specific.
HECVAT Pro Advice
[Add expert insights and best practices]
Implementation Tips
[Add practical steps for SME SaaS vendors]
FAQ
[Add common questions related to this HECVAT item]
Resources
[Add links to relevant articles or tools]