Collection
NCSA continuously collects system logs and network data, and it utilizes automated tools to analyze and send notifications to the Security Operations and Incident Response Team.
Review
Security Operations team members review these notices during normal business hours and escalate when judged further investigation is required. Escalation follows the NCSA Incident Response procedures.
...
System Administrators may request log reviews by the Security team by submitting a ticket or through the NCSA Help Desk.
Tracking
Requests made directly via the ticket system or via the NCSA Help Desk are recorded and closed after an investigation completes. Findings that escalate to an incident investigation are tracked and managed per NCSA Incident Response Procedures, which include the appropriate reporting mechanisms.