Create a plan for analysing data from security monitoring, including:
• Determining whether the organisation is capable of building its own analytics expertise or whether
to buy it.
• Priority, frequency and resources spent on analytics.
• Tools, services and mechanisms for searching, processing and analysing.
• Administration and further development, including:
o signature-based tools
o desired state of the information system
o methodology and automated processing of collected security-relevant data
o reconfigure tool for collecting security-relevant data
o analytics tools, technology and algorithms for applied machine learning
• Reporting.
• Incident management.
A process for reporting incidents is maintained to help staff report incidents efficiently and consistently.
Things to report as an incident include e.g.:
The personnel guidelines emphasize the obligation to report security incidents as soon as possible in accordance with the agreed process. The instructions also describe other operations in the event of an incident (e.g. recording seen error messages and other details).
The organization must:
The organization must define what technology is needed in order to achieve the information security objectives? And, what technology must be acquired / developed in order to achieve the information security goals?
Organization must describe the baseline of normal behaviour for the use of network and data systems, which is used as a starting point for identifying anomalies.
When defining the baseline, the following must be taken into account:
Monitoring systems must be configured against the baseline to identify anomalous behavior such as:
Management shall define responsibilities and establish procedures to ensure an effective and consistent response to security incidents.
Management must ensure e.g.:
The process must ensure e.g.:
Organization should use tools that support both manual and automated searches, including criteria-based searches. The tool should be able to automatically collate data from different sources to more easily determine whether an incident is genuine, as well as its scope and nature.
These operations and processes can be implemented with SIEM (Security information and event management). SIEM solutions use analytics tools, technology and algorithms (e.g., newer SIEM solutions employ applied machine learning) to help detect unknown threats and abnormalities in the security-relevant data. Also SIEM solutions allow organizations to modify already existing (which usually come pre-configured) and add criteria-based alerts to match known threats. These things will help detect threats earlier.
System logs often contain a wealth of information, much of which is irrelevant to security monitoring. In order to identify events relevant to security monitoring, consideration should be given to automatically copying appropriate message types to another log or to using appropriate utilities or audit tools to review and resolve files.
Security systems are the data systems that are in place to protect the information we have, not so much to process it.
We regularly evaluate the operation of different security systems and the need for new systems.
In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.