07.07.2015 Views

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Cyber</strong> <strong>Security</strong> <strong>Monitoring</strong> and Logging <strong>Guide</strong>Most respondents to the Project Survey said that their cyber security monitoring process covered their:• Network perimeter• Endpoints (eg. PCs and laptops)• Core devices and systems (internal).However, many respondents stated that their cyber security monitoring process does not fully cover core devices andsystems that are outsourced or cloud based.!<strong>Monitoring</strong> systems that are outside your direct control (eg. those that have beenoutsourced or are run ‘in the cloud’) can be an extremely daunting prospect – butcan be critical in helping to identify IOCs in a timely and effective manner.About three quarters of respondents said they considered cyber security monitoring and logging in:• Cloud computing services• Outsourcing arrangements• New projects.But far less considered them for mergers and acquisitions.<strong>Cyber</strong> security monitoring challengesA range of different monitoring challenges were experienced by most respondents to the Project Survey, with the top fivebeing to:• Determine where best to spend the cyber security budget• Detect anomalous system and network behaviour, distinguishing real anomalous behaviour from ‘noise’• Determine that an event is actually a cyber security incident• Link threat intelligence and log outputs to provide an overall picture of your threat profile• Justify the cost / time to deal with very rare cyber security incidents.For many organisations, the most challenging part of the monitoring process is accurately detecting and assessing possiblecyber security incidents - determining whether an incident has occurred and, if so, the type, extent, and magnitude of theproblem.“Not every attack is a cyber security attack – so situational awareness is important”!Organisations often treat a cyber security incident as if it is a single one-off event. Inreality, for most sophisticated incidents, they may have been going on for some time(including reconnaissance) and/or cover more than one part of your organisation.Prerequisites for cyber security monitoringWhen monitoring cyber security events, one of the most important actions is to be properly prepared. In the event of acyber security incident occurring this will help you to recover your systems more quickly, minimise the impact of the attack,instil confidence in your customers and even save you money in the long term.!Preparation is often crucial, but can easily be overlooked because of a lack ofawareness, support or resources.26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!