Skip to main content
Skip table of contents

MAS-TRMG – Lists

List Name

List Description

Type

List ID

TypeLog Sources

MAS: Data Loss Prevention

This list includes production data loss prevention devices, including LogRhythm Data Loss Defender.

Log Source

-2555

Log Source

This list includes production data loss prevention devices, including LogRhythm Data Loss Defender.

MAS: File Integrity Monitors

This list includes all production systems that generate file integrity monitoring logs including LogRhythm File Integrity Monitor.

Log Source

-2556

Log Source

This list includes all production systems that generate file integrity monitoring logs including LogRhythm File Integrity Monitor.

MAS: Backup Servers-Systems

This list should be populated with any production system or server that facilitates backup or recovery processes to support disaster recovery, redundancy, or backup procedures.

Log Source

-2557

Log Source

This list should be populated with any production system or server that facilitates backup or recovery processes to support disaster recovery, redundancy, or backup procedures.

MAS: Network Access Control Systems

This list should be populated with production systems that enforce access controls. Examples: VPN servers, WAP, LDAP, Active Directory, Dial-In Servers, etc.

Log Source

-2558

Log Source

This list should be populated with production systems that enforce access controls. Examples include: VPN servers, WAP, LDAP, Active Directory, Dial-In Servers, etc.

MAS: Malware Prevention Systems

This list should be populated with production systems that generate malware detection & prevention logs. Examples: anti-virus and spyware detection/prevention systems.

Log Source

-2559

Log Source

This list should be populated with production systems that generate malware detection & prevention logs. Examples: anti- virus and spyware detection/prevention systems.

MAS: Physical Security Systems

This list should be populated and periodically updated according to physical security systems in-scope for the organization.

Log Source

-2560

Log Source

This list is to be populated and periodically updated according to physical security systems in-scope for the organization.

MAS: Network Security Systems

This list should be populated with production network security systems. Examples: firewalls, intrusion detection/prevention systems, proxies, load balancers, routers, firewalls.

Log Source

-2561

Log Source

This list should be populated with production network security systems (firewalls, intrusion detection/prevention systems, proxies, load balancers, routers, firewalls).

MAS: Test Servers-Systems

This list should be populated with any server or system that is utilized in a test setting and facilitates change management prior to a migration to a production environment. This should align with entity structure.

Entity

-2562

Entity

This list should be populated with any server or system that is utilized in a test setting and facilitates change management prior to a migration to a production environment. This should align with entity structure.

MAS: Production Servers- Systems

This list should be populated with any server or system that is utilized in a production setting, but is not classified as critical in nature. This should align with entity structure

Entity

-2563

Entity

This list should be populated with any server or system that is utilized in a production setting, but is not classified as critical in nature. This should align with entity structure

MAS: Critical Servers-Systems

This list should be populated with any server or system classified as critical where financial data resides or is processed through transactions. Further any servers or systems containing proprietary data should be considered as critical. This should align with entity structure classifications.

Entity

-2564

Entity

This list should be populated with any server or system classified as critical where financial data resides or is processed through transactions. Further any servers or systems containing proprietary data should be considered as critical.

This should align with entity structure classifications.

MAS: Terminated Accounts

This list should be populated and periodically updated with those accounts classified as terminated through the user access management process. List updates should build off existing periodic access review results.

User

-2565

User

This list should be populated and periodically updated with those accounts classified as terminated through the user access management process. List updates should build off existing periodic access review results.

MAS: Shared Accounts

This list should be populated and periodically updated with those accounts where multiple users may utilize the shared account. List updates should build off existing periodic access review results.

User

-2566

User

This list should be populated and periodically updated with those accounts where multiple users may utilize the shared account. List updates should build off existing periodic access review results.

MAS: Default & Generic Accounts

This list includes pre-populated or known default accounts, but should also be populated with other default or generic accounts within the organization’s environment. List updates should build off existing periodic access review results.

User

-2567

User

This list includes pre-populated or known default accounts, but should also be populated with other default or generic accounts within the organization’s environment. List updates should build off existing periodic access review results.

MAS: Vendor Accounts

This list should be populated and periodically updated with those accounts classified as vendor or third-party related with access to your environment. List updates should build off existing periodic access review results.

User

-2568

User

This list should be populated and periodically updated with those accounts classified as vendor or third-party related with access to your environment. List updates should build off existing periodic access review results.

MAS: HR Payroll Accounts

This list should be populated and periodically updated with those accounts classified as HR or Payroll related. List updates should build off existing periodic access review results.

User

-2569

User

This list should be populated and periodically updated with those accounts classified as HR or Payroll related. List updates should build off existing periodic access review results.

MAS: PRD Privileged Accounts

This list should be populated and periodically updated with those accounts classified as privileged in nature within the production environment.

User

-2570

User

This list should be populated and periodically updated with those accounts classified as privileged in nature within the production environment.

MAS: TST Privileged Accounts

This list should be populated and periodically updated with those accounts classified as privileged (ability to migrate changes from test to production).

User

-2571

User

This list should be populated and periodically updated with those accounts classified as privileged (ability to migrate changes from test to production).

MAS: Business User Accounts

This list should be populated and periodically updated with those accounts belonging to Business Users within your environment. List updates should build off existing periodic access review results.

User

-2572

User

This list should be populated and periodically updated with those accounts belonging to Business Users within your environment. List updates should build off existing periodic access review results.

MAS: IT User Accounts

This list should be populated and periodically updated with those accounts belonging to IT personnel. List updates should build off existing periodic access review results.

User

-2573

User

This list should be populated and periodically updated with those accounts belonging to IT personnel. List updates should build off existing periodic access review results.

MAS: All Log Sources

This list captures all MAS log source lists.

Log Source

-2574

Log Source

This list includes all Wireless Intrusion Detection Systems/Services (WIDS) within the boundary.

MAS: Wireless IDS

This list includes all Wireless Intrusion Detection Systems/Services (WIDS) within the boundary.

Log Source

-2575

Log Source

This lists captures all MAS log source lists.

MAS: Online Banking Servers- Systems

This list should be populated with any server or system that is utilized in the online banking environment. This should align with entity structure.

Entity

-2576

Entity

This list should be populated with any server or system that is utilized in the online banking environment. This should align with entity structure.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.