Article Description | Support | AIE Rules/Alarms | Investigations | Reports |
---|
Article 17: Right to erasure | Augment | CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Abnormal Origin Location CCF: Blacklist Location Auth CCF: Local Account Created and Used CCF: Corroborated Data Access Anomalies CCF: Corroborated Account Anomalies CCF: Abnormal Amount of Data Transferred CCF: Large Outbound Transfer CCF: GeoIP General Activity CCF: GeoIP Blacklisted Region Activity CCF: Social Media Event CCF: Unknown User Account Alarm | CCF: GeoIP Inv CCF: Social Media Inv CCF: Unknown User Account Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv | CCF: GeoIP Summary CCF: Social Media Summary CCF: Object Access Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: User Object Access Summary CCF: Applications Accessed By User Summary CCF: Unknown User Account Detail CCF: Host Access Granted And Revoked Detail |
Article 18: Right to restriction of processing | Augment | CCF: GeoIP General Activity CCF: GeoIP Blacklisted Region Activity CCF: Social Media Event CCF: Blacklist Location Auth CCF: Corroborated Data Access Anomalies CCF: Data Loss Prevention Rule CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Abnormal Amount of Data Transferred CCF: Large Outbound Transfer CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Disabled Account Auth Success CCF: Local Account Created and Used CCF: External Brute Force Auths CCF: Auth After Numerous Failed Auths CCF: Auth After Security Event CCF: Distributed Brute Force CCF: Blacklist Location Auth CCF: Concurrent VPN from Multiple Locations CCF: Corroborated Account Anomalies CCF: Abnormal Origin Location CCF: Unknown User Account Alarm | CCF: Suspicious Users Inv CCF: User Misuse Inv CCF: Applications Accessed Inv CCF: Host Access Granted And Revoked Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: GeoIP Inv CCF: Social Media Inv CCF: Unknown User Account Inv | CCF: Top Suspicious Users CCF: User Misuse Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: GeoIP Summary CCF: Social Media Summary CCF: Unknown User Account Detail CCF: Host Access Granted And Revoked Detail |
Article 21: Right to object | Augment | CCF: GeoIP General Activity CCF: GeoIP Blacklisted Region Activity CCF: Blacklist Location Auth CCF: Disabled Account Auth Success CCF: Local Account Created and Used CCF: Abnormal Origin Location CCF: Unknown User Account Alarm | CCF: Suspicious Users Inv CCF: Applications Accessed Inv CCF: Host Access Granted And Revoked Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: GeoIP Inv CCF: Unknown User Account Inv | CCF: Top Suspicious Users CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: GeoIP Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |
Article 22: Automated individual decision- making, including profiling | Augment | CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Abnormal Amount of Data Transferred CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Large Outbound Transfer CCF: Disabled Account Auth Success CCF: Misuse Rule CCF: Social Media Event CCF: Backup Information CCF: Attack then External Connection CCF: Config Change After Attack CCF: Config Change then Critical Error CCF: Config Deleted/Disabled CCF: Config Modified CCF: Local Account Created and Used CCF: External Brute Force Auths CCF: Auth After Numerous Failed Auths CCF: Auth After Security Event CCF: Corroborated Data Access Anomalies CCF: Distributed Brute Force CCF: Blacklist Location Auth CCF: Concurrent VPN from Multiple Locations CCF: Critical Event After Attack CCF: Corroborated Account Anomalies CCF: Abnormal Origin Location CCF: Malware Alarm CCF: Non-Encrypted Protocol Alarm CCF: Rogue Access Point Alarm CCF: Suspected Wireless Attack Alarm CCF: Time Sync Error Alarm CCF: Vulnerability Detected Alarm CCF: Early TLS/SSL Alarm CCF: Unknown User Account Alarm CCF: Backup Failure Alarm CCF: LogRhythm Silent Log Source Error Alarm CCF: Critical/PRD Envir Config/Policy Change Alarm CCF: Critical/PRD Envir Patch Failure Alarm CCF: Critical/PRD Envir Signature Fail Alarm | CCF: Suspicious Users Inv CCF: Use Of Non-Encrypted Protocols Inv CCF: User Misuse Inv CCF: Backup Activity Inv CCF: Applications Accessed Inv CCF: Compromises Detected Inv CCF: Host Access Granted And Revoked Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: Config/Policy Change Inv CCF: Critical Environment Error Inv CCF: Malware Detected Inv CCF: Patch Applied Inv CCF: Physical Access Inv CCF: Rogue Access Point Inv CCF: Signature Failure Inv CCF: Suspected Wireless Attack Inv CCF: Time Sync Error Inv CCF: Vulnerability Detected Inv CCF: Unknown User Account Inv | CCF: Top Suspicious Users CCF: Use Of Non-Encrypted Protocols Summary CCF: User Misuse Summary CCF: Backup Activity Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: Config/Policy Change Summary CCF: Critical Environment Error Summary CCF: Malware Detected Summary CCF: Patch Applied Summary CCF: Physical Access Summary CCF: Rogue Access Point Summary CCF: Signature Failure Summary CCF: Suspected Wireless Attack Summary CCF: Time Sync Error Summary CCF: Vulnerability Detected Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |
Article 24: Responsibility of the controller | Augment | CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Abnormal Amount of Data Transferred CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Large Outbound Transfer CCF: Disabled Account Auth Success CCF: Misuse Rule CCF: Social Media Event CCF: Backup Information CCF: Attack then External Connection CCF: Config Change After Attack CCF: Config Change then Critical Error CCF: Config Deleted/Disabled CCF: Config Modified CCF: Local Account Created and Used CCF: External Brute Force Auths CCF: Auth After Numerous Failed Auths CCF: Auth After Security Event CCF: Corroborated Data Access Anomalies CCF: Distributed Brute Force CCF: Blacklist Location Auth CCF: Concurrent VPN from Multiple Locations CCF: Critical Event After Attack CCF: Corroborated Account Anomalies CCF: GeoIP General Activity CCF: GeoIP Blacklisted Region Activity CCF: Blacklist Location Auth CCF: Abnormal Origin Location CCF: Malware Alarm CCF: Non-Encrypted Protocol Alarm CCF: Rogue Access Point Alarm CCF: Suspected Wireless Attack Alarm CCF: Time Sync Error Alarm CCF: Vulnerability Detected Alarm CCF: Early TLS/SSL Alarm CCF: Unknown User Account Alarm CCF: Backup Failure Alarm CCF: LogRhythm Silent Log Source Error Alarm CCF: Critical/PRD Envir Config/Policy Change Alarm CCF: Critical/PRD Envir Patch Failure Alarm CCF: Critical/PRD Envir Signature Fail Alarm | CCF: Suspicious Users Inv CCF: Use Of Non-Encrypted Protocols Inv CCF: User Misuse Inv CCF: Backup Activity Inv CCF: Applications Accessed Inv CCF: Compromises Detected Inv CCF: Host Access Granted And Revoked Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: Config/Policy Change Inv CCF: Critical Environment Error Inv CCF: Malware Detected Inv CCF: Patch Applied Inv CCF: Physical Access Inv CCF: Rogue Access Point Inv CCF: Signature Failure Inv CCF: Suspected Wireless Attack Inv CCF: Time Sync Error Inv CCF: Vulnerability Detected Inv CCF: Unknown User Account Inv CCF: GeoIP Inv | CCF: Top Suspicious Users CCF: Use Of Non-Encrypted Protocols Summary CCF: User Misuse Summary CCF: Backup Activity Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: Config/Policy Change Summary CCF: Critical Environment Error Summary CCF: Malware Detected Summary CCF: Patch Applied Summary CCF: Physical Access Summary CCF: Rogue Access Point Summary CCF: Signature Failure Summary CCF: Suspected Wireless Attack Summary CCF: Time Sync Error Summary CCF: Vulnerability Detected Summary CCF: GeoIP Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |
Article 25: Data protection by design and by default | Augment | CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Abnormal Amount of Data Transferred CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Large Outbound Transfer CCF: Disabled Account Auth Success CCF: Misuse Rule CCF: Backup Information CCF: Attack then External Connection CCF: Config Change After Attack CCF: Config Change then Critical Error CCF: Config Deleted/Disabled CCF: Config Modified CCF: Large Outbound Transfer CCF: Local Account Created and Used CCF: External Brute Force Auths CCF: Auth After Numerous Failed Auths CCF: Auth After Security Event CCF: Corroborated Data Access Anomalies CCF: Distributed Brute Force CCF: Blacklist Location Auth CCF: Concurrent VPN from Multiple Locations CCF: Critical Event After Attack CCF: Corroborated Account Anomalies CCF: Abnormal Origin Location CCF: Social Media Event CCF: GeoIP General Activity CCF: GeoIP Blacklisted Region Activity CCF: Blacklist Location Auth CCF: Malware Alarm CCF: Non-Encrypted Protocol Alarm CCF: Rogue Access Point Alarm CCF: Suspected Wireless Attack Alarm CCF: Time Sync Error Alarm CCF: Vulnerability Detected Alarm CCF: Early TLS/SSL Alarm CCF: Unknown User Account Alarm CCF: Backup Failure Alarm CCF: LogRhythm Silent Log Source Error Alarm CCF: Critical/PRD Envir Config/Policy Change Alarm CCF: Critical/PRD Envir Patch Failure Alarm CCF: Critical/PRD Envir Signature Fail Alarm | CCF: Suspicious Users Inv CCF: Use Of Non-Encrypted Protocols Inv CCF: User Misuse Inv CCF: Backup Activity Inv CCF: Applications Accessed Inv CCF: Compromises Detected Inv CCF: Host Access Granted And Revoked Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: Config/Policy Change Inv CCF: Critical Environment Error Inv CCF: Malware Detected Inv CCF: Patch Applied Inv CCF: Physical Access Inv CCF: Rogue Access Point Inv CCF: Signature Failure Inv CCF: Suspected Wireless Attack Inv CCF: Time Sync Error Inv CCF: Vulnerability Detected Inv CCF: Unknown User Account Inv CCF: GeoIP Inv | CCF: Top Suspicious Users CCF: Use Of Non-Encrypted Protocols Summary CCF: User Misuse Summary CCF: Backup Activity Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: Config/Policy Change Summary CCF: Critical Environment Error Summary CCF: Malware Detected Summary CCF: Patch Applied Summary CCF: Physical Access Summary CCF: Rogue Access Point Summary CCF: Signature Failure Summary CCF: Suspected Wireless Attack Summary CCF: Time Sync Error Summary CCF: Vulnerability Detected Summary CCF: GeoIP Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |
Article 32: Security of processing | Augment | CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Abnormal Amount of Data Transferred CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Large Outbound Transfer CCF: Disabled Account Auth Success CCF: Misuse Rule CCF: Backup Information CCF: Attack then External Connection CCF: Config Change After Attack CCF: Config Change then Critical Error CCF: Config Deleted/Disabled CCF: Config Modified CCF: Local Account Created and Used CCF: External Brute Force Auths CCF: Auth After Numerous Failed Auths CCF: Auth After Security Event CCF: Corroborated Data Access Anomalies CCF: Distributed Brute Force CCF: Blacklist Location Auth CCF: Concurrent VPN from Multiple Locations CCF: Critical Event After Attack CCF: Corroborated Account Anomalies CCF: Abnormal Origin Location CCF: Social Media Event CCF: GeoIP General Activity CCF: GeoIP Blacklisted Region Activity CCF: Blacklist Location Auth CCF: Malware Alarm CCF: Non-Encrypted Protocol Alarm CCF: Rogue Access Point Alarm CCF: Suspected Wireless Attack Alarm CCF: Time Sync Error Alarm CCF: Vulnerability Detected Alarm CCF: Early TLS/SSL Alarm CCF: Unknown User Account Alarm CCF: Backup Failure Alarm CCF: LogRhythm Silent Log Source Error Alarm CCF: Critical/PRD Envir Config/Policy Change Alarm CCF: Critical/PRD Envir Patch Failure Alarm CCF: Critical/PRD Envir Signature Fail Alarm | CCF: Suspicious Users Inv CCF: Use Of Non-Encrypted Protocols Inv CCF: User Misuse Inv CCF: Backup Activity Inv CCF: Applications Accessed Inv CCF: Compromises Detected Inv CCF: Host Access Granted And Revoked Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: Config/Policy Change Inv CCF: Critical Environment Error Inv CCF: Malware Detected Inv CCF: Patch Applied Inv CCF: Physical Access Inv CCF: Rogue Access Point Inv CCF: Signature Failure Inv CCF: Suspected Wireless Attack Inv CCF: Time Sync Error Inv CCF: Vulnerability Detected Inv CCF: Unknown User Account Inv CCF: GeoIP Inv | CCF: Top Suspicious Users CCF: Use Of Non-Encrypted Protocols Summary CCF: User Misuse Summary CCF: Backup Activity Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: Config/Policy Change Summary CCF: Critical Environment Error Summary CCF: Malware Detected Summary CCF: Patch Applied Summary CCF: Physical Access Summary CCF: Rogue Access Point Summary CCF: Signature Failure Summary CCF: Suspected Wireless Attack Summary CCF: Time Sync Error Summary CCF: Vulnerability Detected Summary CCF: GeoIP Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |
Article 33: Notification of a personal data breach to the supervisory authority | Augment | CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Abnormal Amount of Data Transferred CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Large Outbound Transfer CCF: Misuse Rule CCF: Local Account Created and Used CCF: Disabled Account Auth Success CCF: Distributed Brute Force CCF: External Brute Force Auths CCF: Critical Event After Attack CCF: Corroborated Data Access Anomalies CCF: Corroborated Account Anomalies CCF: Auth After Numerous Failed Auths CCF: Auth After Security Event CCF: Attack then External Connection CCF: Config Change After Attack CCF: Config Change then Critical Error CCF: Concurrent VPN from Multiple Locations CCF: Malware Alarm CCF: Non-Encrypted Protocol Alarm CCF: Rogue Access Point Alarm CCF: Suspected Wireless Attack Alarm CCF: Time Sync Error Alarm CCF: Vulnerability Detected Alarm CCF: Early TLS/SSL Alarm CCF: LogRhythm Silent Log Source Error Alarm CCF: Unknown User Account Detail Alarm | CCF: Suspicious Users Inv CCF: Use Of Non-Encrypted Protocols Inv CCF: User Misuse Inv CCF: Compromises Detected Inv CCF: Host Access Granted And Revoked Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: Critical Environment Error Inv CCF: Malware Detected Inv CCF: Rogue Access Point Inv CCF: Suspected Wireless Attack Inv CCF: Time Sync Error Inv CCF: Vulnerability Detected Inv CCF: Unknown User Account Inv | CCF: Top Suspicious Users CCF: Use Of Non-Encrypted Protocols Summary CCF: User Misuse Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: Critical Environment Error Summary CCF: Malware Detected Summary CCF: Patch Applied Summary CCF: Rogue Access Point Summary CCF: Suspected Wireless Attack Summary CCF: Time Sync Error Summary CCF: Vulnerability Detected Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |
Article 34: Communication of a personal data breach to the data subject | Augment | CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Abnormal Amount of Data Transferred CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Large Outbound Transfer CCF: Misuse Rule CCF: Local Account Created and Used CCF: Disabled Account Auth Success CCF: Distributed Brute Force CCF: External Brute Force Auths CCF: Critical Event After Attack CCF: Corroborated Account Anomalies CCF: Corroborated Data Access Anomalies CCF: Auth After Numerous Failed Auths CCF: Auth After Security Event CCF: Attack then External Connection CCF: Config Change After Attack CCF: Config Change then Critical Error CCF: Concurrent VPN from Multiple Locations CCF: Malware Alarm CCF: Early TLS/SSL Alarm CCF: Non-Encrypted Protocol Alarm CCF: Rogue Access Point Alarm CCF: Suspected Wireless Attack Alarm CCF: Time Sync Error Alarm CCF: Vulnerability Detected Alarm CCF: LogRhythm Silent Log Source Error Alarm CCF: Unknown User Account Alarm | CCF: Suspicious Users Inv CCF: Use Of Non-Encrypted Protocols Inv CCF: User Misuse Inv CCF: Compromises Detected Inv CCF: Host Access Granted And Revoked Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: Critical Environment Error Inv CCF: Malware Detected Inv CCF: Rogue Access Point Inv CCF: Suspected Wireless Attack Inv CCF: Time Sync Error Inv CCF: Vulnerability Detected Inv CCF: Unknown User Account Inv | CCF: Top Suspicious Users CCF: Use Of Non-Encrypted Protocols Summary CCF: User Misuse Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: Critical Environment Error Summary CCF: Malware Detected Summary CCF: Patch Applied Summary CCF: Rogue Access Point Summary CCF: Suspected Wireless Attack Summary CCF: Time Sync Error Summary CCF: Vulnerability Detected Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |
Article 35: Data protection impact assessment | Augment | CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Abnormal Amount of Data Transferred CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Large Outbound Transfer CCF: Disabled Account Auth Success CCF: Misuse Rule CCF: Social Media Event CCF: Backup Information CCF: Attack then External Connection CCF: Config Change After Attack CCF: Config Change then Critical Error CCF: Config Deleted/Disabled CCF: Config Modified CCF: Local Account Created and Used CCF: External Brute Force Auths CCF: Auth After Numerous Failed Auths CCF: Auth After Security Event CCF: Corroborated Data Access Anomalies CCF: Distributed Brute Force CCF: Blacklist Location Auth CCF: Concurrent VPN from Multiple Locations CCF: Critical Event After Attack CCF: Corroborated Account Anomalies CCF: Abnormal Origin Location CCF: GeoIP General Activity CCF: GeoIP Blacklisted Region Activity CCF: Blacklist Location Auth CCF: Malware Alarm CCF: Non-Encrypted Protocol Alarm CCF: Rogue Access Point Alarm CCF: Suspected Wireless Attack Alarm CCF: Time Sync Error Alarm CCF: Vulnerability Detected Alarm CCF: Early TLS/SSL Alarm CCF: Unknown User Account Alarm CCF: Backup Failure Alarm CCF: LogRhythm Silent Log Source Error Alarm CCF: Critical/PRD Envir Config/Policy Change Alarm CCF: Critical/PRD Envir Patch Failure Alarm CCF: Critical/PRD Envir Signature Fail Alarm | CCF: Suspicious Users Inv CCF: Use Of Non-Encrypted Protocols Inv CCF: User Misuse Inv CCF: Backup Activity Inv CCF: Applications Accessed Inv CCF: Compromises Detected Inv CCF: Host Access Granted And Revoked Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: Config/Policy Change Inv CCF: Critical Environment Error Inv CCF: Malware Detected Inv CCF: Patch Applied Inv CCF: Physical Access Inv CCF: Rogue Access Point Inv CCF: Signature Failure Inv CCF: Suspected Wireless Attack Inv CCF: Time Sync Error Inv CCF: Vulnerability Detected Inv CCF: GeoIP Inv CCF: Social Media Inv CCF: Unknown User Account Inv | CCF: Top Suspicious Users CCF: Use Of Non-Encrypted Protocols Summary CCF: User Misuse Summary CCF: Backup Activity Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: Config/Policy Change Summary CCF: Critical Environment Error Summary CCF: Malware Detected Summary CCF: Patch Applied Summary CCF: Physical Access Summary CCF: Rogue Access Point Summary CCF: Signature Failure Summary CCF: Suspected Wireless Attack Summary CCF: Time Sync Error Summary CCF: Vulnerability Detected Summary CCF: GeoIP Summary CCF: Social Media Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |
Article 40: Codes of conduct | Augment | CCF: Social Media Event CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Abnormal Amount of Data Transferred CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Large Outbound Transfer CCF: Corroborated Data Access Anomalies CCF: Backup Information CCF: GeoIP General Activity CCF: GeoIP Blacklisted Region Activity CCF: Local Account Created and Used CCF: Disabled Account Auth Success CCF: Misuse Rule CCF: Abnormal Origin Location CCF: Blacklist Location Auth CCF: Concurrent VPN from Multiple Locations CCF: Backup Failure Alarm CCF: Non-Encrypted Protocol Alarm CCF: Early TLS/SSL Alarm CCF: Unknown User Account Alarm | CCF: Use Of Non-Encrypted Protocols Inv CCF: User Misuse Inv CCF: Host Access Granted And Revoked Inv CCF: Backup Activity Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: GeoIP Inv CCF: Social Media Inv CCF: Unknown User Account Inv | CCF: Use Of Non-Encrypted Protocols Summary CCF: User Misuse Summary CCF: Backup Activity Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: GeoIP Summary CCF: Social Media Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |
Article 44: General principle for transfers | Augment | CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Abnormal Amount of Data Transferred CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Large Outbound Transfer CCF: Corroborated Data Access Anomalies CCF: Corroborated Account Anomalies CCF: Concurrent VPN from Multiple Locations CCF: Social Media Event CCF: GeoIP General Activity CCF: GeoIP Blacklisted Region Activity CCF: Abnormal Origin Location CCF: Blacklist Location Auth CCF: Disabled Account Auth Success CCF: Misuse Rule CCF: Local Account Created and Used CCF: Unknown User Account Alarm CCF: Non-Encrypted Protocol Alarm CCF: Early TLS/SSL Alarm | CCF: Use Of Non-Encrypted Protocols Inv CCF: User Misuse Inv CCF: Host Access Granted And Revoked Inv CCF: Backup Activity Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: GeoIP Inv CCF: Social Media Inv CCF: Unknown User Account Inv | CCF: Use Of Non-Encrypted Protocols Summary CCF: User Misuse Summary CCF: Backup Activity Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: GeoIP Summary CCF: Social Media Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |
Article 45: Transfers on the basis of an adequacy decision | Augment | CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Abnormal Amount of Data Transferred CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Large Outbound Transfer CCF: Corroborated Data Access Anomalies CCF: Corroborated Account Anomalies CCF: Social Media Event CCF: GeoIP General Activity CCF: GeoIP Blacklisted Region Activity CCF: Abnormal Origin Location CCF: Blacklist Location Auth CCF: Disabled Account Auth Success CCF: Misuse Rule CCF: Concurrent VPN from Multiple Locations CCF: Local Account Created and Used CCF: Non-Encrypted Protocol Alarm CCF: Early TLS/SSL Alarm CCF: Unknown User Account Alarm | CCF: Use Of Non-Encrypted Protocols Inv CCF: User Misuse Inv CCF: Host Access Granted And Revoked Inv CCF: Backup Activity Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: GeoIP Inv CCF: Social Media Inv CCF: Unknown User Account Inv | CCF: Use Of Non-Encrypted Protocols Summary CCF: User Misuse Summary CCF: Backup Activity Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: GeoIP Summary CCF: Social Media Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |
Article 46: Transfers subject to appropriate safeguards | Augment | CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Abnormal Amount of Data Transferred CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Large Outbound Transfer CCF: Disabled Account Auth Success CCF: Misuse Rule CCF: Social Media Event CCF: Backup Information CCF: Attack then External Connection CCF: Config Change After Attack CCF: Config Change then Critical Error CCF: Config Deleted/Disabled CCF: Config Modified CCF: Local Account Created and Used CCF: External Brute Force Auths CCF: Auth After Numerous Failed Auths CCF: Auth After Security Event CCF: Corroborated Data Access Anomalies CCF: Distributed Brute Force CCF: Blacklist Location Auth CCF: Concurrent VPN from Multiple Locations CCF: Critical Event After Attack CCF: Corroborated Account Anomalies CCF: Abnormal Origin Location CCF: GeoIP General Activity CCF: GeoIP Blacklisted Region Activity CCF: Blacklist Location Auth CCF: Malware Alarm CCF: Non-Encrypted Protocol Alarm CCF: Rogue Access Point Alarm CCF: Suspected Wireless Attack Alarm CCF: Time Sync Error Alarm CCF: Vulnerability Detected Alarm CCF: Early TLS/SSL Alarm CCF: Unknown User Account Alarm CCF: Backup Failure Alarm CCF: LogRhythm Silent Log Source Error Alarm CCF: Critical/PRD Envir Config/Policy Change Alarm CCF: Critical/PRD Envir Patch Failure Alarm CCF: Critical/PRD Envir Signature Fail Alarm | CCF: Suspicious Users Inv CCF: Use Of Non-Encrypted Protocols Inv CCF: User Misuse Inv CCF: Backup Activity Inv CCF: Applications Accessed Inv CCF: Compromises Detected Inv CCF: Host Access Granted And Revoked Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: Config/Policy Change Inv CCF: Critical Environment Error Inv CCF: Malware Detected Inv CCF: Patch Applied Inv CCF: Physical Access Inv CCF: Rogue Access Point Inv CCF: Signature Failure Inv CCF: Suspected Wireless Attack Inv CCF: Time Sync Error Inv CCF: Vulnerability Detected Inv CCF: GeoIP Inv CCF: Social Media Inv CCF: Unknown User Account Inv | CCF: Top Suspicious Users CCF: Use Of Non-Encrypted Protocols Summary CCF: User Misuse Summary CCF: Backup Activity Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: Config/Policy Change Summary CCF: Critical Environment Error Summary CCF: Malware Detected Summary CCF: Patch Applied Summary CCF: Physical Access Summary CCF: Rogue Access Point Summary CCF: Signature Failure Summary CCF: Suspected Wireless Attack Summary CCF: Time Sync Error Summary CCF: Vulnerability Detected Summary CCF: GeoIP Summary CCF: Social Media Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |
Article 47: Binding corporate rules | Augment | CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Abnormal Amount of Data Transferred CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Large Outbound Transfer CCF: Disabled Account Auth Success CCF: Misuse Rule CCF: Social Media Event CCF: Backup Information CCF: Attack then External Connection CCF: Config Change After Attack CCF: Config Change then Critical Error CCF: Config Deleted/Disabled CCF: Config Modified CCF: Local Account Created and Used CCF: External Brute Force Auths CCF: Auth After Numerous Failed Auths CCF: Auth After Security Event CCF: Corroborated Data Access Anomalies CCF: Distributed Brute Force CCF: Blacklist Location Auth CCF: Concurrent VPN from Multiple Locations CCF: Critical Event After Attack CCF: Corroborated Account Anomalies CCF: Abnormal Origin Location CCF: GeoIP General Activity CCF: GeoIP Blacklisted Region Activity CCF: Blacklist Location Auth CCF: Malware Alarm CCF: Non-Encrypted Protocol Alarm CCF: Rogue Access Point Alarm CCF: Suspected Wireless Attack Alarm CCF: Time Sync Error Alarm CCF: Vulnerability Detected Alarm CCF: Early TLS/SSL Alarm CCF: Unknown User Account Alarm CCF: Backup Failure Alarm CCF: LogRhythm Silent Log Source Error Alarm CCF: Critical/PRD Envir Config/Policy Change Alarm CCF: Critical/PRD Envir Patch Failure Alarm CCF: Critical/PRD Envir Signature Fail Alarm | CCF: Suspicious Users Inv CCF: Use Of Non-Encrypted Protocols Inv CCF: User Misuse Inv CCF: Backup Activity Inv CCF: Applications Accessed Inv CCF: Compromises Detected Inv CCF: Host Access Granted And Revoked Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: Config/Policy Change Inv CCF: Critical Environment Error Inv CCF: Malware Detected Inv CCF: Patch Applied Inv CCF: Physical Access Inv CCF: Rogue Access Point Inv CCF: Signature Failure Inv CCF: Suspected Wireless Attack Inv CCF: Time Sync Error Inv CCF: Vulnerability Detected Inv CCF: GeoIP Inv CCF: Social Media Inv CCF: Unknown User Account Inv | CCF: Top Suspicious Users CCF: Use Of Non-Encrypted Protocols Summary CCF: User Misuse Summary CCF: Backup Activity Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: Config/Policy Change Summary CCF: Critical Environment Error Summary CCF: Malware Detected Summary CCF: Patch Applied Summary CCF: Physical Access Summary CCF: Rogue Access Point Summary CCF: Signature Failure Summary CCF: Suspected Wireless Attack Summary CCF: Time Sync Error Summary CCF: Vulnerability Detected Summary CCF: GeoIP Summary CCF: Social Media Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |
Article 90: Obligations of secrecy | Augment | CCF: FIM Abnormal Activity CCF: FIM Add Activity Rule CCF: FIM Delete Activity Rule CCF: FIM Information Rule CCF: FIM General Activity CCF: Data Loss Prevention Rule CCF: Abnormal Amount of Data Transferred CCF: Data Destruction CCF: Data Exfiltration Observed CCF: Large Outbound Transfer CCF: Disabled Account Auth Success CCF: Misuse Rule CCF: Social Media Event CCF: Backup Information CCF: Attack then External Connection CCF: Config Change After Attack CCF: Config Change then Critical Error CCF: Config Deleted/Disabled CCF: Config Modified CCF: Local Account Created and Used CCF: External Brute Force Auths CCF: Auth After Numerous Failed Auths CCF: Auth After Security Event CCF: Corroborated Data Access Anomalies CCF: Distributed Brute Force CCF: Blacklist Location Auth CCF: Concurrent VPN from Multiple Locations CCF: Critical Event After Attack CCF: Corroborated Account Anomalies CCF: Abnormal Origin Location CCF: Social Media Event CCF: GeoIP General Activity CCF: GeoIP Blacklisted Region Activity CCF: Blacklist Location Auth CCF: Malware Alarm CCF: Non-Encrypted Protocol Alarm CCF: Rogue Access Point Alarm CCF: Suspected Wireless Attack Alarm CCF: Time Sync Error Alarm CCF: Vulnerability Detected Alarm CCF: Early TLS/SSL Alarm CCF: Unknown User Account Alarm CCF: Backup Failure Alarm CCF: LogRhythm Silent Log Source Error Alarm CCF: Critical/PRD Envir Config/Policy Change Alarm CCF: Critical/PRD Envir Patch Failure Alarm CCF: Critical/PRD Envir Signature Fail Alarm | CCF: Suspicious Users Inv CCF: Use Of Non-Encrypted Protocols Inv CCF: User Misuse Inv CCF: Backup Activity Inv CCF: Applications Accessed Inv CCF: Compromises Detected Inv CCF: Host Access Granted And Revoked Inv CCF: LogRhythm Data Loss Defender Log Inv CCF: Object Access Inv CCF: User Object Access Inv CCF: Config/Policy Change Inv CCF: Critical Environment Error Inv CCF: Malware Detected Inv CCF: Patch Applied Inv CCF: Physical Access Inv CCF: Rogue Access Point Inv CCF: Signature Failure Inv CCF: Suspected Wireless Attack Inv CCF: Time Sync Error Inv CCF: Vulnerability Detected Inv CCF: GeoIP Inv CCF: Social Media Inv CCF: Unknown User Account Inv | CCF: Top Suspicious Users CCF: Use Of Non-Encrypted Protocols Summary CCF: User Misuse Summary CCF: Backup Activity Summary CCF: Applications Accessed By User Summary CCF: LogRhythm Data Loss Defender Log Summary CCF: Object Access Summary CCF: User Object Access Summary CCF: Config/Policy Change Summary CCF: Critical Environment Error Summary CCF: Malware Detected Summary CCF: Patch Applied Summary CCF: Physical Access Summary CCF: Rogue Access Point Summary CCF: Signature Failure Summary CCF: Suspected Wireless Attack Summary CCF: Time Sync Error Summary CCF: Vulnerability Detected Summary CCF: GeoIP Summary CCF: Social Media Summary CCF: Host Access Granted And Revoked Detail CCF: Unknown User Account Detail |