T 2.4 Insufficient monitoring of security safeguards

After introducing safeguards to help achieve information processing security (e. g. classification of information, data backup, access control, rules regarding the conduct during emergencies), it is also necessary to ensure they are implemented consistently. If the security measures are not monitored or monitoring is inadequate, then it is impossible to determine whether the security measures are being followed or are proving effective. This impedes the ability to react to the respective situation in a timely and appropriate manner.

In addition, there are some security measures the effectiveness of which can only be seen when appropriate controls are implemented. For example, these include logging functions the security properties of which only become apparent when the logged data is analysed.

Examples: