07.07.2015 Views

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Cyber</strong> <strong>Security</strong> <strong>Monitoring</strong> and Logging <strong>Guide</strong>The event analysis processMany SOCs use a work flow approach to help them deal with relevant events from various sources. Events are categorised,prioritised and assessed by an assigned analyst according to a defined process, such as the one shown in Figure 11 below.AlertsIDSAlertsLogsAlertsSTAPAlertsOtherSourcesSIEMNormaliseCorrelateRulesFalse positivereduction asrequiredIntelligenceEventVerifyAnalyseIncidentReportActionPlanFigure 11: The event analysis processIt is then up to a skilled analyst to find the unusual and anomalous events using tools, processes, intelligence and their ownexperience and ingenuity.“You should sometimes let the analysts be hunters to go find anomalies”43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!