The topic of incident response was discussed in the previous chapter. In this chapter, we will introduce some security monitoring techniques. The objective of this chapter is to prepare our security monitoring mechanism to protect and prevent our cloud services from being attacked. To be prepared for this, our security monitoring procedures should include logging, monitoring the framework, threat intelligence, and security scanning for malicious programs. The topics that will be covered in this chapter are as follows:
- Logging policy
- Security monitoring framework
- Source of information
- Threat intelligence toolset
- Security scanning toolset
- Malware behavior matching—YARA