U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.


We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

White Paper (Draft)

[Project Description] Continuous Monitoring for IT Infrastructure: Techniques for auditing user activity and detecting irregular activity events within small and medium-size businesses

Date Published: June 2019
Comments Due: July 26, 2019 (public comment period is CLOSED)
Email Questions to: smb_nccoe@nist.gov


Karen Waltermire (NIST), Kelley Burgin (MITRE), Chinedum Irrechukwu (MITRE), Harry Perper (MITRE), Susan Prince (MITRE), Devin Wynne (MITRE)


The National Cybersecurity Center of Excellence (NCCoE) is seeking comments on a draft Project Description.

The NCCoE is proposing a project to explore continuous monitoring capabilities that can effectively, efficiently and automatically detect when a malicious actor—be it an authorized user or external actor—attempts to perform an action in an organization's IT infrastructure that could result in financial, reputational, and operational impacts to the organization.

Many organizations monitor business information technology (IT) infrastructure by manual inspection or computer-aided audits, which can result in after-the-fact detection of malicious-user access events.

This project will describe how to address this issue by collecting appropriate log data from the IT infrastructure. Furthermore, the continuous monitoring capabilities can also be used to automate analysis and reporting of the log data to alert the proper personnel in the organization with actionable information and guidance so they may take measures toward resolving the detected issue. This project will result in a freely available NIST Cybersecurity Practice Guide, which includes a reference architecture, a fully implemented example solution, and a detailed guide of practical steps needed to implement the solution.



access management; compliance; continuous monitoring; medium business; small business; unauthorized access; user access control
Control Families

Access Control; Audit and Accountability; System and Information Integrity


Project Description

Supplemental Material:
Submit Comments (other)
Project homepage (other)

Document History:
06/17/19: White Paper (Draft)