This is the Trace Id: 0169880f30f853de72d6d8a88df44b46
Practice 9

Implement​ security monitoring​ and response

 

This practice focuses on maintaining continuous visibility into both the vulnerabilities attackers can exploit and anomalies that may be signs of an active attack. This is critically important to guide your risk mitigation efforts and to ensure you can detect, respond to, and recover from attacks. 

This is often referred to as posture management or vulnerability management (for ‘left of bang' preventive measures) and security operations (SecOps/SOC) for ‘right of bang’ management of active incidents. 

9.1 Proactively detect and address threats - Use a security analytics and threat intelligence platform to enable attack detection, threat visibility, proactive hunting, and threat response. This is often composed of extended detection and response (XDR) tools for well-known attacks, a security information and event management (SIEM) for building custom detections based on log files, and a Security Data Lake for long-term efficient storage of archival log files. A well-designed system for application, system, and security log files and other data sources is key to enable effective threat detection, investigation and forensic analysis, threat hunting, threat intelligence, and similar activities. 

9.2 Establish a standard incident response process – Preparing an Incident Response Plan is crucial for helping to address new threats that can emerge over time. It should be created in coordination with your organization’s dedicated Product Security Incident Response Team (PSIRT). The plan should include who to contact in case of a security emergency, and establish the protocol for security servicing, including plans for code inherited from other groups within the organization and for third-party code. The incident response plan should be tested before it is needed!