
The organization should clearly document those requirements that cannot be satis-
fied, communicate this decision to stakeholders (and attempt to negotiate the
requirements, if appropriate), and determine any potential consequences that may
result.
4. Identify risks that result from unsatisfied requirements.
In some cases, the inability to satisfy a monitoring requirement may pose addi-
tional operational risk to the organization. This is particularly true when monitor-
ing processes are a fundamental part of other operational resilience management
processes such as incident management or vulnerability management. In these
cases, the inability to satisfy a monitoring requirement should be documented, and
any resulting risk should be referred to the organization’s risk management process
for analysis and resolution.
The risk management cycle is addressed in the Risk Management process area.
MON:SG2 PERFORM MONITORING
The monitoring process is performed throughout the enterprise.
Monitoring activities are typically thought of as technology-driven and therefore
as part of the domain of information technology. In reality, monitoring activities
are often performed throughout the organization, take many forms (from service
desk calls to automated monitoring of networks and systems), and involve many
different people and their skills.
Effective monitoring requires people, processes, and technology that have to
be deployed and managed to meet monitoring requirements and provide timely
and accurate information to other operational resilience management processes.
This requires the establishment of appropriate infrastructure to support the
process, collection standards and processes to ensure consistency and accuracy of
information, the active collection of data, and the distribution of data to relevant
stakeholders.
Depending on resources, the criticality of the monitoring processes, and the
objectives for gathering and distributing monitoring data, the organization may
perform monitoring processes, establish infrastructure, and distribute informa-
tion through internal activities or source some or all of these processes to out-
sourcers. In some cases, monitoring may be included as part of the outsourcing of
For example, the organization may have
• resource (human and financial) limitations or constraints
• lack of adequate infrastructure or supporting processes or technology
• insufficient funding for outsourcing requirements
• an inability to determine clear benefits from the investment in satisfying a monitoring
requirement
MON
Monitoring 587