Security monitoring
Now that we have beaten the network architecture discussion to death, it is time to look at how to tackle what, in my opinion, is the second-most effective method to improve the ICS security posture: security monitoring.
Security monitoring comprises all the tools, techniques, activities, and actions involved in verifying the effectiveness of a security program. Security monitoring includes topics such as log monitoring, configuration verification, alert visualization, passive and active network scanning/mapping, vulnerability management, Intrusion Detection Systems (IDSes), Security Information and Event Management (SIEM), and so on.
The many aspects of security monitoring are the main topics of this book and will be explained in depth throughout the remaining chapters. What follows is a discussion on how the designing for security architecture we covered in the previous sections is used to set up the tools and systems that allow us to implement security...