Question
As a portion of security compliance, one of the board members used SANS security controls at a former business and was very pleased with its
As a portion of security compliance, one of the board members used SANS security controls at a former business and was very pleased with its outcomes. Based on this knowledge and to meet the needs of the board members, you have decided on implementing a few monitoring rules to help meet the requirements of five of the SANS Top 20 Controls.
For this part of your project, you will be addressing the following SANS Security Controls:
Asset Inventory of Authorized and Unauthorized Devices
Software Inventory of Authorized and Unauthorized Devices
Malware Defenses
Boundary Defense
Controlled use of Administrative Privileges
For each of these controls below, create a document that details the following information for each monitoring rule:
Brief description of the monitoring used and the alerting processes
Devices to pull log data from in order to satisfy the monitoring rule.
Frequency of the log data collection: (Real-Time, Hourly, Weekly, Monthly, Annually)
At least two ways this monitor could be tested to validate any false positives or negatives
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started