Monitoring Outposts
You are now confident and enabled to implement security and compliance around your hybrid architecture. Internal security threats originating within an organization from a current or former employee, a contractor, or a business associate are often underestimated.
No company is static; change is the only constant. It is not enough to create a process and train people to do the right thing; you also have to make sure people are not engaging in any wrongdoing behind your back. Moreover, it is not only people that fail; hardware also fails. Systems are designed to operate within certain limits, but what happens when the upper or lower limits are breached?
The obvious answer is that you must act in response to these events, but how can you become aware that something is happening within your walls? The answer is that you must monitor and be alerted about these events, which is what this chapter is about. It will cover the following:
- Monitoring the capabilities...