Security is a critical aspect of any application. Security monitoring should be considered during solution design. As you learned when we looked at security in the various architectural components in Chapter 8, Security Considerations, security needs to be applied at all layers. You need to implement security monitoring to act and respond to any event. The following significant components show where monitoring needs to be applied:
- Network security: Monitor any unauthorized port opening, suspicious IP address, and activity.
- User access: Monitor any unauthorized user access and suspicious user activity.
- Application security: Monitor any malware or virus attack.
- Web security: Monitor a Distributed Denial of Service (DDoS) attack, SQL injection, or cross-site scripting (XSS).
- Server security: Monitor any gap in security patches.
- Compliance: Monitor any compliance lapses such as violations of payment card industry (PCI) compliance checks for payment applications or the...