We are using Pega 7.1.9, As part of security assessment across the products customer requested weather Pega supports following security monitoring? Can someone please advice if yes/no followed by a brief explanation
The level of monitoring performed includes all of the below?
1. Detection of malware;
2. Detection of injection attacks;
3. Detection of brute force attacks;
4. Detection of a denial of service attack;
5. Unauthorised access to sensitive resources;
6. Unauthorised termination of security processes; and
7. Events that exceed defined thresholds.
***Edited by moderator, Maryrita: moved to Product Support from Applications***