DE.CM-03 requires organizations to personnel activity and technology usage are monitored to find potentially adverse events. This NIST CSF 2.0 control falls under the Detect (DE) function and the Continuous Monitoring category. Use this checklist to verify implementation and prepare evidence for auditors.
Control Details
- Control ID
- DE.CM-03
- Title
- Personnel Activity Monitoring
- Function
- Detect (DE)
- Category
- Continuous Monitoring
- Framework
- NIST CSF 2.0
Personnel activity and technology usage are monitored to find potentially adverse events.
Personnel activity and technology usage are monitored to find potentially adverse events. This includes monitoring user behavior for anomalies that could indicate insider threats or compromised accounts.
Why This Matters
Insider threats and compromised user accounts are difficult to detect with traditional perimeter defenses. User behavior analytics identify anomalous activity that rule-based systems miss.
Implementation Checklist
Use this checklist to verify your organization meets the requirements of DE.CM-03.
Evidence an Auditor Expects
Prepare the following documentation and artifacts to demonstrate compliance with DE.CM-03 during an audit.
- UEBA tool deployment documentation and detection rules
- Privileged activity monitoring configuration and sample logs
- Anomalous activity alert examples and investigation records
- Data loss prevention rule sets and alert reports
- Privacy impact assessment for personnel monitoring
Common Gaps We Find
Based on our penetration testing and risk assessment engagements, these are the gaps organizations most frequently have with DE.CM-03.
- Privileged user activity is logged but never reviewed or analyzed
- No user behavior analytics capability is deployed
- Personnel monitoring program lacks a privacy impact assessment
FAQ
What does DE.CM-03 require?
How do I prove compliance with DE.CM-03?
Need Help Meeting NIST CSF 2.0 Requirements?
Our penetration testing and risk assessments map directly to NIST CSF 2.0 controls. Sherlock Forensics identifies gaps in your compliance posture and provides actionable remediation guidance.
Get a Compliance Assessment