D.2 Monitor intrusions/violations Controls for identifying malicious activity at runtime. Controls D.2.1 System monitoring Detect runtime product anomalies D.2.2 Build process monitoring Detect intruders in the build infrastructure