You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: data/Informationgathering.yml
+23-52Lines changed: 23 additions & 52 deletions
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,7 @@
2
2
Monitoring:
3
3
Advanced availablity and stability metrics:
4
4
risk: Trends and advanced attacks are not detected.
5
-
measure: Advanced metrics are gathered in relation to availability and stability.
6
-
For example unplanned downtimes per year.
5
+
measure: Advanced metrics are gathered in relation to availability and stability. For example unplanned downtime's per year.
7
6
difficultyOfImplementation:
8
7
knowledge: 3
9
8
time: 3
@@ -15,8 +14,7 @@ Monitoring:
15
14
- Visualized metrics
16
15
samm2: o-incident-management|A|2
17
16
Advanced webapplication metrics:
18
-
risk: People are not looking into tests results. Vulnerabilities not recolonized,
19
-
even they are detected by tools.
17
+
risk: People are not looking into tests results. Vulnerabilities not recolonized, even they are detected by tools.
20
18
measure: All defects from the dimension Test- and Verification are instrumented.
21
19
difficultyOfImplementation:
22
20
knowledge: 3
@@ -30,8 +28,7 @@ Monitoring:
30
28
samm2: o-incident-management|A|2
31
29
Alerting:
32
30
risk: Incidents are discovered after they happend.
33
-
measure: Thresholds for metrics are set. In case the thresholds are reached, alarms
34
-
are send out. Which should get attention due to the critically.
31
+
measure: Thresholds for metrics are set. In case the thresholds are reached, alarms are send out. Which should get attention due to the critically.
35
32
difficultyOfImplementation:
36
33
knowledge: 2
37
34
time: 5
@@ -43,14 +40,8 @@ Monitoring:
43
40
samm2: o-operational-management|B|3
44
41
samm: OE1-B
45
42
Coverage and control metrics:
46
-
risk: The effectiveness of configuration, patch and vulnerablity management is
47
-
unknown.
48
-
measure: "Usage of Coverage- and control-metrics to show the effectivness of the
49
-
security programm. Coverage is the degree in \n which a specific security
50
-
control for a specifc target group is applied with all resoucres.\n The
51
-
control degree shows the actual application of security standards and security-guidelines.
52
-
Examples are gathering information on anti-virus, anti-rootkits, patch management,
53
-
server configuration and vulnerability management."
43
+
risk: The effectiveness of configuration, patch and vulnerability management is unknown.
44
+
measure: "Usage of Coverage- and control-metrics to show the effectiveness of the security program. Coverage is the degree in \n which a specific security control for a specific target group is applied with all resources.\n The control degree shows the actual application of security standards and security-guidelines. Examples are gathering information on anti-virus, anti-rootkits, patch management, server configuration and vulnerability management."
54
45
difficultyOfImplementation:
55
46
knowledge: 3
56
47
time: 5
@@ -74,10 +65,8 @@ Monitoring:
74
65
- Visualized metrics
75
66
samm2: o-incident-management|A|1
76
67
Defence metrics:
77
-
risk: IDS/IPS systems like packet- or application-firewalls detect and prevent
78
-
attacks. It is not known how many attacks has been detected and blocked.
79
-
measure: Gathering of defence metrics like TCP/UDP sources enables to assume the
80
-
geographic location of the requeist.
68
+
risk: IDS/IPS systems like packet- or application-firewalls detect and prevent attacks. It is not known how many attacks has been detected and blocked.
69
+
measure: Gathering of defence metrics like TCP/UDP sources enables to assume the geographic location of the request.
81
70
difficultyOfImplementation:
82
71
knowledge: 3
83
72
time: 5
@@ -111,8 +100,7 @@ Monitoring:
111
100
samm2: o-incident-management|A|2
112
101
Screens with metric visualization:
113
102
risk: Security related information is discovered too late during an incident.
114
-
measure: By having an internal accessable screen with a security related dashboards
115
-
helps to visualize incidents.
103
+
measure: By having an internal accessible screen with a security related dashboards helps to visualize incidents.
116
104
difficultyOfImplementation:
117
105
knowledge: 2
118
106
time: 1
@@ -124,8 +112,7 @@ Monitoring:
124
112
samm2: o-incident-management|A|2
125
113
Simple application metrics:
126
114
risk: Attacks on an application are not recognized.
127
-
measure: Gathering of application metrics helps to identify incidents like brute
128
-
force attacks, login/logout.
115
+
measure: Gathering of application metrics helps to identify incidents like brute force attacks, login/logout.
129
116
difficultyOfImplementation:
130
117
knowledge: 2
131
118
time: 2
@@ -135,11 +122,8 @@ Monitoring:
135
122
implementation: Prometheus
136
123
samm2: o-incident-management|A|1
137
124
Simple system metrics:
138
-
risk: Without simple metrics analysis of incidents are hard. In case an application
139
-
uses a lot of CPU from time to time, it is hard for a developer to find out
140
-
the source with linux commands.
141
-
measure: Gathering of system metrics helps to identify incidents and specially
142
-
bottlenecks like in CPU usage, memory usage and hard disk usage.
125
+
risk: Without simple metrics analysis of incidents are hard. In case an application uses a lot of CPU from time to time, it is hard for a developer to find out the source with linux commands.
126
+
measure: Gathering of system metrics helps to identify incidents and specially bottlenecks like in CPU usage, memory usage and hard disk usage.
143
127
difficultyOfImplementation:
144
128
knowledge: 2
145
129
time: 2
@@ -149,10 +133,8 @@ Monitoring:
149
133
implementation: collectd
150
134
samm2: o-incident-management|A|1
151
135
Targeted alerting:
152
-
risk: People are bored (irodiert) of incident alarm messages, as they are not
153
-
responsbile to react.
154
-
measure: By the defintion of target groups for incidents people are only getting
155
-
alarms for incidents they are in charge for.
136
+
risk: People are bored (ignorant) of incident alarm messages, as they are not responsible to react.
137
+
measure: By the definition of target groups for incidents people are only getting alarms for incidents they are in charge for.
156
138
difficultyOfImplementation:
157
139
knowledge: 2
158
140
time: 5
@@ -164,8 +146,8 @@ Monitoring:
164
146
samm: OE1-B
165
147
samm2: o-operational-management|B|3
166
148
Visualized metrics:
167
-
risk: Not vizualized metrics lead to restricted usage of metrics.
168
-
measure: Metrics are vizualized in real time in a user friendly way.
149
+
risk: Not visualized metrics lead to restricted usage of metrics.
150
+
measure: Metrics are visualized in real time in a user friendly way.
169
151
difficultyOfImplementation:
170
152
knowledge: 1
171
153
time: 2
@@ -178,11 +160,8 @@ Monitoring:
178
160
samm2: o-incident-management|A|2
179
161
Logging:
180
162
Centralized application logging:
181
-
risk: Local stored logs can be unauthorized manipulated by attackers with system
182
-
access or might be corrupt after an incident. In addition, it is hard to perform
183
-
an correlation of logs. This leads attacks, which can be performed silently.
184
-
measure: A centralized logging system is used and applications logs (including
185
-
application exceptions) are shipped to it.
163
+
risk: Local stored logs can be unauthorized manipulated by attackers with system access or might be corrupt after an incident. In addition, it is hard to perform an correlation of logs. This leads attacks, which can be performed silently.
164
+
measure: A centralized logging system is used and applications logs (including application exceptions) are shipped to it.
186
165
difficultyOfImplementation:
187
166
knowledge: 1
188
167
time: 1
@@ -219,11 +198,8 @@ Logging:
219
198
implementation: rsyslog, logstash, fluentd, bash
220
199
samm2: o-incident-management|A|1
221
200
Centralized system logging:
222
-
risk: Local stored system logs can be unauthorized manipulated by attackers or
223
-
might be corrupt after an incident. In addition, it is hard to perform a aggregation
224
-
of logs.
225
-
measure: By using centralized logging logs are protected against unauthorized
226
-
modification.
201
+
risk: Local stored system logs can be unauthorized manipulated by attackers or might be corrupt after an incident. In addition, it is hard to perform a aggregation of logs.
202
+
measure: By using centralized logging logs are protected against unauthorized modification.
227
203
difficultyOfImplementation:
228
204
knowledge: 1
229
205
time: 1
@@ -233,10 +209,8 @@ Logging:
233
209
implementation: rsyslog, Logstash
234
210
samm2: o-incident-management|A|1
235
211
Correlation of security events:
236
-
risk: Detection of security related events with hints on different systems/tools/metrics
237
-
is not possible.
238
-
measure: Events are correlated on one system. For example the correlation and
239
-
visualisationof enhance login tries combined with successfull logins.
212
+
risk: Detection of security related events with hints on different systems/tools/metrics is not possible.
213
+
measure: Events are correlated on one system. For example the correlation and visualisation of failed login attempts combined with successful login attempts.
240
214
difficultyOfImplementation:
241
215
knowledge: 4
242
216
time: 4
@@ -248,11 +222,8 @@ Logging:
248
222
- Alerting
249
223
samm2: o-incident-management|A|2
250
224
Visualized logging:
251
-
risk: System and application protocols are not visualized properly which leads
252
-
to no or very limited logging assessment. Specally developers might have difficulty
253
-
to read applications logs with unusually tools like the Linux tool 'cat'
254
-
measure: Protocols are visualized in a simple to use real time monitoring system.
255
-
The GUI gives the ability to search for specal attributes in the protocol.
225
+
risk: System and application protocols are not visualized properly which leads to no or very limited logging assessment. Specially developers might have difficulty to read applications logs with unusually tools like the Linux tool 'cat'
226
+
measure: Protocols are visualized in a simple to use real time monitoring system. The GUI gives the ability to search for special attributes in the protocol.
0 commit comments