Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

As a portion of security compliance, one of the board members used SANS security controls at a former business and was very pleased with its

As a portion of security compliance, one of the board members used SANS security controls at a former business and was very pleased with its outcomes. Based on this knowledge and to meet the needs of the board members, you have decided on implementing a few monitoring rules to help meet the requirements of five of the SANS Top 20 Controls.

For this part of your project, you will be addressing the following SANS Security Controls:

Asset Inventory of Authorized and Unauthorized Devices

Software Inventory of Authorized and Unauthorized Devices

Malware Defenses

Boundary Defense

Controlled use of Administrative Privileges

For each of these controls below, create a document that details the following information for each monitoring rule:

Brief description of the monitoring used and the alerting processes

Devices to pull log data from in order to satisfy the monitoring rule.

Frequency of the log data collection: (Real-Time, Hourly, Weekly, Monthly, Annually)

At least two ways this monitor could be tested to validate any false positives or negatives

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database And Expert Systems Applications 15th International Conference Dexa 2004 Zaragoza Spain August 30 September 3 2004 Proceedings Lncs 3180

Authors: Fernando Galindo ,Makoto Takizawa ,Roland Traunmuller

2004th Edition

3540229361, 978-3540229360

Students also viewed these Databases questions