9 hours 54 minutes
everyone. Welcome back to the core. So in the last video, we talked about control number five again. That was secured. Configuration for hardware and software are mobile devices, workstations, laptops and servers.
In this video, we're to talk about control number six, which is maintenance monitoring, analysis of our audit logs. We're also going to talk briefly about the sub controls associated with this C I s control.
So as I mentioned, we're talking about the maintenance, monitoring and analysis of audit logs. Well, why do we even care about getting on? It loves. Why do we care about monitoring them? Why do we care about analyzing them and maintaining them? Well, number one is will be blind to attacks if we don't, right. If we just collect logs and we never look at them, there's no point
also helps us discover. Is there an attack? Right. So as we're auditing logs, we may actually notice an attack in a lot of times. That's what happens is
people will notice that Hey, there wasn't attacked three months ago. There was a breach.
Hey, let's see what else? It's affected, right? So a lot of times a criminal Attackers will get in and we will know we won't notice it for several several months. So that's why it's very important that we continuously audit and monitor these logs.
So sub control 6.1 here is mostly about synchronizing time. So that way we can make sure that we've got
verified timeframe. So date and time stamped on these logs. So utilizing three synchronized time sources to make sure that
if someone corrupts one of them or two of them, we still got additional per copy to say this was the actual time this transpire.
Now for your small business owner, you're probably not going to be grabbing a lot of log data. That's mostly for your enterprise level, as well as your larger enterprises.
Some control 6.2 is where we're talking about activating the audit, logging itself.
So just make sure that, you know, local logging has been enabled on all of our systems and network devices. So we're just capturing all that log data.
Self control 6.3 enabled the detail logging right, so
there are some instances where you may not do detail logging, but overall, look on all your systems. You should have some kind of detail lugging in place. But there may be some, uh, thoughts around. How much do you want to actually back up the detail logs, Right, So it really depends on your particular organization. You mostly see this around the
groups two and three, but also you should be turning on detailed logs
depending on your needs. In a small businesses. Well,
some control 6.4, ensuring that we've got adequate storage for our logs and making sure that we are performing appropriate backups.
And along those lines, we want to make sure that we're storing our logs in multiple places, Right? So let's say that our company uses both Azure Cloud and AWS, for example. We want to make sure backing up to both of those and not just one cloud provider, because what happens if his your goes down right? We want to make sure we have a backup
over logs also on AWS and that in that example,
some control 6.5 where we're talking about centralized in that log management so we don't want to go to 1000 different places to try to look at our logs. We want him to aggregate into one location that's easily visible. That's easily
that we have an easy ability to generate reports for different stakeholders that we can easily see what's actually going on with that data.
Some control 6.6 Deploying Simms or different log analytic tools across our network, so just make sure that we've got a way to capture that data that raw data and make sense of it in some capacity.
Some control. 6.7
As I mentioned before, we always want to regularly review logs. Make sure that we're actually looking at these logs, digesting the data, analyzing it and seeing if we're under attack or if there's a way to optimize the logs. Right. Maybe we need to write another script to capture certain information from the logs that we already have
some control. 6.8. That's where we want to continuously tune our sim right. I want to make sure that
we want toe. We want to make sure that we're able to better identify what's actionable events and maybe decreased the false alerts. Right, So that's where the fine tuning comes in place. It's a continuous process.
So in this video, we talked about what CIA's control Number six is, as well as some of the sub controls. And the next video, we're to talk through how those some patrols map up to this cybersecurity framework.
Incident Response Lifecycle
This intermediate-level course will provide the student with in-depth instruction on the lifecycle of cybersecurity ...
5 CEU/CPE Hours Available
Certificate of Completion Offered
Risk Management and Information Systems Control
In this Cybersecurity Risk Management training course, students will come to understand the value of ...
1 CEU/CPE Hours Available
Certificate of Completion Offered