Page 213 - CISSO_Prep_ Guide
P. 213

Knowing normal activity levels will also assist in being able to
            detect any types of abnormal activity.

            Audit logs are important and should record all activity on a
            system or at least activities that are sensitive or critical, such as
            administrative changes or incidents where a person viewed
            protected data or tried to log in with the incorrect information.
            Synchronizing data between various logs requires the time on
            each device to be synchronized - otherwise, it can be very
            challenging to associate activity between the logs.
            Other detective devices are firewalls, host-based intrusion
            detection and prevention systems, and application logs. Each
            tool can assist the organization is tracking types and frequency
            of attacks, the misuse of the system by users or administrators,
            and frequent errors or misconfigurations. The organization
            should conduct vulnerability assessments and penetration tests
            regularly to help identify any weaknesses or gaps in their
            security.

            People are the best incident detection device for an organization.
            Everyone within the organization should understand their
            responsibility to watch for and report any suspicious activity.
            Outside people may also be a source of information about
            possible incidents. The organization should have a process for
            an outsider to report a problem if a potential problem is
            detected.



            Classification of an Incident
            Once an incident has been detected, the first step is learning the
            scope, size, and potential impact of the incident. An incident
            poses an immediate risk to the organization, but also may pose a
   208   209   210   211   212   213   214   215   216   217   218