Part 8 Flashcards
Even with the most robust security tools in place, it is important to ____ your systems.
monitor
Monitor ____
Systems
All security products are ____ and can ____ or be ____.
manmade, fail, compromised
As with any other aspect of technology, one should ____on simply one product or tool.
never rely
Enabling ____ on your systems is one way to put your organization in a position to identify problem areas.
logging
The problem is, ____
what should be logged?
Logging mechanisms and the ability to track ____ are critical.
user activities
The presence of logs in all environments allows thorough tracking and analysis if something does go wrong. Determining the cause of a compromise is very difficult without ____:
system activity logs
Invalid ____ access attempts
logical
Record at least the following \_\_\_\_ for all system components for each event: ● User identification ● Type of event ● Date and time ● Success or failure indication ● Origination of event
audit trail entries
____ or name of affected data, system component, or resource
Identity
____ for all system components at least daily. ______ must include those servers that perform security functions like intrusion detection system (IDS) and authentication, authorization, and accounting protocol (AAA) servers (for example, RADIUS).
Note: Log harvesting, parsing, and alerting tools may
be used to achieve compliance.
Review logs
Fortunately, there are tools that will collect and ____ log files from a variety of sources. All these tools have the ability to notify individuals of a particular event.
parse
Hire a ____ to Audit Security
Third Party
Regardless of how talented your staff is, there is always the possibility that they ___ something or inad- vertently misconfigured a device or setting.
overlooked