07.07.2015 Views

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Cyber</strong> <strong>Security</strong> <strong>Monitoring</strong> and Logging <strong>Guide</strong>Ref Name of source Purpose Criticality Cost1 Internal/historic • TrendsEssentialFree• Priorities2 Commercial – mainstream • Awareness• Commodity malwareImportant / Essential £3 Law enforcement • Criminals Important / Essential Free4 Government • Breach notification - veryspecific (national element)5 Communities of interest (eg. CISP) • Can cover all - specific valuein target organisationImportant / EssentialImportantFree£ or free6 Open source intelligence (OSINT) • Covers all (consider quality) Important / Specialised Free7 CERT • Specific value in targetorganisation8 Specialist COI • Specific value in targetorganisationImportant / SpecialisedImportant / Specialised£ or free£ or free9 Commercial – specialist • Targeted attack Specialised ££Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community, theterm “open” refers to overt, publicly available sources (as opposed to closed industry or professional groups; and covert orclandestine sources); it is not related to open-source software or public intelligence.!The cost to process many of these sources of data tends to be the inverse of the costto buy them.Logs used to help identify IOCsWhen analysing potential sources of information for indicators of compromise, most respondents analysed internallogs. However, very few (around 20% or less) analysed the following data to a high or very high extent:• Threat intelligence (eg. reconnaissance data; suspicious threat agent activity; analysis of impact)• External logs (eg. Cloud, MSSP)• ‘Big Data’.!Without analysing information from these three areas it will be very difficult todetect or address many potential indicators of compromise.<strong>Cyber</strong> security threat intelligenceWhen monitoring cyber security events, it is essential to have access to appropriate, up-to-date cyber threatintelligence. This should include research into the attackers to determine their capabilities, motives and likely actions.Much of this kind of intelligence can be provided by the government, CERTS, collaborative groups or expert thirdparties, such as many CREST members.If you use cyber threat intelligence, you will more clearly understand the tactics, techniques and procedures of theattackers and your organisation may be able to defeat some attacks by disrupting or degrading their efforts. Threatintelligence can also help you detect an incident during the reconnaissance phase, before you have actually beenattacked.31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!