9 - 3: Incident Investigation Flashcards
Syslog
An old, still-used format for creating various types of logs
Syslog components
1) Header (timestamp, source) 2) Facility, a 24-bit message describing where in the system it originated 3) Severity (from 0 being emergency to 7 being a debug error) 4) Message itself
syslog-ng
Added security and delivery enhancements in 1998
Rsyslog
Added even more enhancements in 2004
Log tagging
Associating keywords or other identifiers to make finding logs easier
Two advantages of SIEMS
1) Centralized log repository 2) Apply AI to analyze and interpret logs for anomalous material
SOAR platform
Security, Orchestration, Automation, Response
Playbooks
Procedures tied to policy
Runbooks
Automated SOAR activity when triggered by an event
SOC reports
Service Organization Control: audits a service provider does of itself so their customers don’t have to audit them directly
SOC 1 reports
Most basic report, provide customers with assurance during their own financial audits
SOC 2 reports
Include more sensitive data related to confidentiality, integrity, and availability
SOC 3 reports
Contain SOC 2 sensitive information, but also designed for publication
SOC Type 1 reports
Describe controls and provide auditors’ opinion
SOC Type 2 reports
Include controls, auditors’ opinion, as well as testing results