07.07.2015 Views

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Cyber</strong> <strong>Security</strong> <strong>Monitoring</strong> and Logging <strong>Guide</strong>Logging challengesThere are many challenges facing organisations when it comes to monitoring the relevant events on their systems andnetworks for signs of a cyber security attack. For example, organisations often collect a lot of cyber security-related data,but do not have the resources, technical skills or awareness to analyse that data effectively.“Organisations can put blind trust in the monitoring tools they have purchased, giving them afalse sense of security”Project research revealed that many long established, ‘traditional’ logging challenges still remain, which includes organisations:• Struggling to understand the purpose, importance and effectiveness of the full range of data sources (putting theminto some sort of ‘pecking order’ of importance)• Suffering from the sheer volume of log management tasks such as:o Turning on relevant logs, logging them correctly and keeping them long enougho Prioritisation, storage, correlation and protection of logs• Failing to examine alerts in an effective manner (eg. handling false positives, performing situational analysis andremediating issues)• Being unsure as to which logs they need to pay most (and least) attention or the implications of the events thatthey record• Not being able to find the right tools and people to help them easily, effectively and at the right price.Many challenges reported are still traditional logging challenges that go back many years, but they have actually got worsein recent times due to the:• Proliferation of data located outside the perimeter, such as in-cloud service providers or outsourced arrangements• Vast amounts of structured and unstructured data, fuelled by the rise of consumerism (eg. social networking),creating data sets so large and complex that traditional data processing approaches are inadequate – often referred toas ‘Big Data’.“We are not just looking for a needle in a haystack; we have to find the right haystack(s)”Addressing many of the traditional logging challenges in depth – such as examiningdetailed fields in event logs - is out of scope for this project as they are well coveredin other guidance, such as the CPNI/Context report ‘Effective Log Management’.17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!