Difference between revisions of "Log Management and Compliance"

From Socology.org - The Study of Security Operations
Jump to: navigation, search
(Citations)
(Process)
Line 7: Line 7:
 
== [[Process]] ==
 
== [[Process]] ==
  
 +
1. Identify what logs are needed based on compliance regulations.
 +
 +
2. Configure devices with the necessary information to send logs to a SIEM or other logging mechanism.
 +
 +
3. Verify logs are being received by the SIEM or log management server.
 +
 +
4. Use business cases to generate alerts when necessary.
 +
 +
5. Review the logs after network maintenance and upgrades.
  
 
== [[Tooling]] ==
 
== [[Tooling]] ==

Revision as of 08:00, 3 November 2018

This section is under development

Objective

To discuss log management and compliance in relation to industry-specific compliance regulations. Regulations discussed will be PCI, SOX, HIPAA, etc.

Process

1. Identify what logs are needed based on compliance regulations.

2. Configure devices with the necessary information to send logs to a SIEM or other logging mechanism.

3. Verify logs are being received by the SIEM or log management server.

4. Use business cases to generate alerts when necessary.

5. Review the logs after network maintenance and upgrades.

Tooling

Ticketing

Reporting

Staffing

Budgeting

Communications

Documentation

Lessons Learned | Pain Points

Citations

Network Managment Division of Ipswitch Inc. https://www.ipswitch.com/Ipswitch/media/Ipswitch/Documents/Resources/Whitepapers%20and%20eBooks/ELM_Security_WP.pdf?ext=.pdf