07.07.2015 Views

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Cyber</strong> <strong>Security</strong> <strong>Monitoring</strong> and Logging <strong>Guide</strong>!It is important that you carry out these prerequisites in a diligent manner prior tobuilding your cyber security monitoring and logging capability.3. Identify sources of potential indicators of compromiseIn many organisations, thousands of possible signs of cyber security incidents may occur each day, recorded mainly bylogging and computer security software, but it can be difficult to determine which ones are most important to you – andto separate ‘signal’ from ‘noise’.There are many different sources of information relating to IOCs,which include:• <strong>Security</strong> software (eg. IDS, IPS, DLP, SIEM, antivirus and spam software,file integrity checking software) and monitoring services (oftenprovided by a third party)• Tools that employ potential malware isolation and investigationtechniques (eg. sandboxing or virtual execution engines)• Logs (eg. operating system logs, service and application logs, networkdevice logs and network flows)• Publicly available information (eg. information on new exploits, thirdparty organisations, governments)• People from within your organisation• Third parties (eg. customers, suppliers, IT providers, ISPs, partner andgovernment bodies).??CYBERSECURITYINCIDENT??Dependent on the requirements you defined, you need to identify the most relevant and important sources of informationfor indicators of compromise to support your cyber security monitoring and logging capability.!Do not just consider internal logs - you also need to analyse:• External logs (eg. Cloud, MSSP)• ‘Big Data’• Threat intelligence (eg. reconnaissance data; suspicious threat agent activity;analysis of impact).4. Design your cyber security monitoring and logging capabilityOnce the perquisites have been completed, and you have identified relevant sources of indicators of compromise, you cannow design your overall cyber security monitoring and logging capability.To implement an effective capability you will need to consider many aspects of:• People – particularly skilled analysts• Process – such as the cyber security event analysis and incident response processes• Technology – typically centred around a well-tuned SIEM, supplemented by a range of log management and eventanalysis tools• Information – particularly reliable, insightful and up-to-date cyber security intelligence.55

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!