Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

DS13.3 - IT Infrastructure Monitoring

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective DS13.3 - IT Infrastructure Monitoring is contained within Process Popup Manage Operations.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

This Topic Has:
17 Members
0 Online
4660 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

IT Infrastructure Monitoring

Define and implement procedures to monitor the IT infrastructure and related events. Ensure that sufficient chronological information is being stored in operations logs to enable the reconstruction, review and examination of the time sequences of operations and the other activities surrounding or supporting operations.

View value and Risk Drivers  help

Hide value and Risk Drivers help

Value Drivers

  • Proactive detection of infrastructure problems likely to result in an incident
  • Ability to monitor trends and deal with potential infrastructure problems before they occur
  • Ability to optimise the deployment and use of resources
  Risk Drivers
  • Infrastructure problems undetected and incidents occur
  • Infrastructure problems causing greater operational and business impact than if they had been prevented or detected earlier
  • Poorly utilised and deployed infrastructure resources

View Control Practices  help

Hide Control Practices  help

  1. Define and implement a process for event logging that identifies the level of information to be recorded based on a consideration of risk and performance.
  2. Identify and maintain a list of infrastructure assets that need to be monitored based on service criticality, and the relationship between configuration items and services that depend on them.
  3. Define and implement rules that identify and record threshold breaches and event conditions. Find a balance between generating spurious minor events and significant events so event logs are not overloaded with unnecessary information.
  4. Produce event logs and retain them for an appropriate period to assist in future investigations.
  5. Establish procedures for monitoring event logs and conduct regular reviews.
  6. Ensure that incident tickets are created in a timely manner when monitoring activities identify deviations.

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 127 total

Must be a Topic member to contribute
View All »
Posted by FarmService 1411 days ago
Posted by FarmService 2496 days ago
Posted by ISACA 31 days ago
Posted by ISACA 31 days ago
Posted by ISACA 500 days ago

Events & Online Learning: 20 total

Journal Articles: 266 total

Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 1, 2018
by Mike Van Stone, CISA, CISSP, CPA, and Ben Halpert
Ever-changing laws continue to increase the risk and cost of noncompliance when unintentional data losses occur.
Volume 1, 2018
GDPR (Regulation [EU] 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union.
Volume 1, 2018
by Steven J. Ross, CISA, CISSP, MBCP
Managing availability in a multi-modal environment requires a great deal of attention to details, which are being defined by the multi-modal pioneers of our day.
Volume 1, 2018
by Mohammed J. Khan, CISA, CRISC, CIPM
To facilitate and administer the implementation of controls around the subject of big data, one must truly understand the concepts of deidentification, reidentification and anonymization.
Volume 1, 2018
by Adeniyi Akanni, Ph. D., CISA, CRISC, ITIL
This article describes a six-stage cycle of implementing big data in commercial banks, points out the major challenges in implementation and provides a suggested solution.

Wikis: 2 total

Blog Posts: 155 total

My personal thoughts after listening to C-level executives at the CxO Roundtable Series sponsored by Intel, IBM, HyTrust & ReedSmith. For an invite, please reach out to me. Data Protection under the GDPR For past few months, I’ve been helping to org...
Posted By : Thomas152 | 0 comments
There are some math models for business that MBAs are taught. Just like assembling burgers for fast food or call wait queue management in a call center, vulnerability patching is a time based business opportunity. Leadership can be expected to use this ...
Posted By : Don Turnblade | 0 comments
I predict that on 1 July 2018, I will be calmly eating a barbecue sandwich, talking with friends and possibly, I will burn a copy of the RFC2246: TLS version 1.0 standard for entertainment value.  Those will less effective Vendor, Network, Systems, Applic...
Posted By : Don Turnblade | 0 comments
Posted By : TafadzwaPadare | 1 comments
2 Feb 2018
We are happy to announce that  on Feb//2018  the ISACA awareness session  was held in Baghdad.This the first time to speak about ISACA Value in Iraq.Professional from government and private sector were excited to hear about ISACA value and they started to...
Posted By : Ali099 | 0 comments
Greetings, is there any member currently studying for their CISA examination so that we can join hands and work together?
Posted By : TafadzwaPadare | 0 comments