Security Operations 4.4 Flashcards
Explain security alerting and monitoring concepts and tools.
Security Monitoring - Systems
What can be monitored?
Authentication - logins from strange places
Server monitoring - Service activity, backups software versions.
Applications - availability - uptime and response times
Data transfers - increases or decreases in rates.
Security notifications - from the developer/manufacturer.
Infrastructure - Remove access systems. Employees, vendors, guests
Log aggregation
SIEM or SEM
Consolidate many different logs to a central database. Servers, firewall, VPN concentrators, SANs, cloud services.
Correlation between diverse systems.
Scanning
A constantly changing threat landscape. Operating systems types and versions. Actively check systems and devices.
Reporting
Analyse the collected data,
Status information, number of devices up to date/in compliance
Devices running older operating systems.
Archiving
SIEM’s handle massive amounts of data. It would be too expensive to keep this dat in active storage and so they move it into offline archives. These are cheaper and can be restored later.
Alerting - Real-time notification of security events.
Important to make sure that the alerts a fine tuned. To avoid false positives and false negatives.
SMS/Text messages to alert.
False positive?
When a non-attack is recorded as an attack.
False negative
A genuine attack not recorded by the systems.
Quarantine
A foundational security response.
SCAP
Security Content Automation Protocol.
What is Security Content Automation Protocol.
Consolidates all vulnerabilities into a single language that all devices understand.
Maintained by the national institute of Standards and Technology (NIST)
Using SCAP
Content can be shared between tools. The specification standard enables automation.
Automation types - ongoing monitoring,
Benchmarks
Is is important to provide security best practices to everything. Operating systems, cloud providers, mobile devices etc.
Agents/agentless
Device installed to check to see if the device is compliance.
Agents usually provide more detail as they are always monitoring for real time notifications.
Agentless runs without a formal install. Performs the check, the disappears.
SIEM
Security information and event management
Log collection of security alerts
log aggregation and long term storage
data correlation