P-SSCRM Documentation
Framework About News Assessment Contact
Framework » Deployment » Monitor intrusions/violations

Practices in Deployment

  • Respond to/disclose vulnerabilities
  • Monitor intrusions/violations

D.2 Monitor intrusions/violations

Controls for identifying malicious activity at runtime.

Controls

D.2.1 System monitoring

Detect runtime product anomalies

D.2.2 Build process monitoring

Detect intruders in the build infrastructure

© 2026 P-SSCRM Documentation. Version 2.0