Note sull'episodio

7.2 Conduct logging and monitoring activities

  • 7.2.1 Intrusion detection and prevention systems (IDPS)
  • 7.2.2 Security information and Event Management (SIEM)
  • 7.2.3 Security orchestration, automation, and response (SOAR)
  • 7.2.4 Continuous Monitoring
  • 7.2.5 Egress Monitoring
  • 7.2.6 Log Management
  • 7.2.7 Threat Intelligence (e.g. Threat feeds, threat hunting)
  • 7.2.8 User and Entity Behavior Analytics (UEBA)