Protections are in place to detect and prevent unauthorised user activity based on context and behaviour.
Specification
The Risky Logins report is frequently monitored and checked.
ISO 27001 & 27002:2022
A5.25,
A5.35,
A5.36,
A8.8,
A8.15,
A8.16,
A8.19,
A8.29,
A8.34
SURF toetsingskader informatiebeveiliging (NBA-volwassenheidsmodel)
SM.05 Security testing surveillance and monitoring