Using security monitoring to improve visibility
A specifically popular control for increasing visibility into the ongoings of your digital estate is the implementation of logging and the aggregation of those logs into a SIEM system.
SIEMs not only provide specialists the ability to investigate logs from your assets in your organization but also, lately they have been able to leverage IPS/IDS features, along with machine learning algorithms to enrich the log data and actively protect against compromise. This shifts the SIEM from being solely a detective control to being both a preventative and detective control, giving context and visibility into the previously dark alcoves of a network, along with reactions to mitigate the effectiveness of a threat actor.
This could include recognizing patterns and actions such as the following:
- Account compromise detection through authentication logs.
- Malware detection through system activity, firewall, IDS/IPS, and CASB (Cloud...