Skip to content

Commit aebe675

Browse files
authored
Update Informationgathering.yml
Corrected formatting, changed typos and sentence build-up
1 parent da12798 commit aebe675

1 file changed

Lines changed: 23 additions & 52 deletions

File tree

data/Informationgathering.yml

Lines changed: 23 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,7 @@
22
Monitoring:
33
Advanced availablity and stability metrics:
44
risk: Trends and advanced attacks are not detected.
5-
measure: Advanced metrics are gathered in relation to availability and stability.
6-
For example unplanned downtimes per year.
5+
measure: Advanced metrics are gathered in relation to availability and stability. For example unplanned downtime's per year.
76
difficultyOfImplementation:
87
knowledge: 3
98
time: 3
@@ -15,8 +14,7 @@ Monitoring:
1514
- Visualized metrics
1615
samm2: o-incident-management|A|2
1716
Advanced webapplication metrics:
18-
risk: People are not looking into tests results. Vulnerabilities not recolonized,
19-
even they are detected by tools.
17+
risk: People are not looking into tests results. Vulnerabilities not recolonized, even they are detected by tools.
2018
measure: All defects from the dimension Test- and Verification are instrumented.
2119
difficultyOfImplementation:
2220
knowledge: 3
@@ -30,8 +28,7 @@ Monitoring:
3028
samm2: o-incident-management|A|2
3129
Alerting:
3230
risk: Incidents are discovered after they happend.
33-
measure: Thresholds for metrics are set. In case the thresholds are reached, alarms
34-
are send out. Which should get attention due to the critically.
31+
measure: Thresholds for metrics are set. In case the thresholds are reached, alarms are send out. Which should get attention due to the critically.
3532
difficultyOfImplementation:
3633
knowledge: 2
3734
time: 5
@@ -43,14 +40,8 @@ Monitoring:
4340
samm2: o-operational-management|B|3
4441
samm: OE1-B
4542
Coverage and control metrics:
46-
risk: The effectiveness of configuration, patch and vulnerablity management is
47-
unknown.
48-
measure: "Usage of Coverage- and control-metrics to show the effectivness of the
49-
security programm. Coverage is the degree in \n which a specific security
50-
control for a specifc target group is applied with all resoucres.\n The
51-
control degree shows the actual application of security standards and security-guidelines.
52-
Examples are gathering information on anti-virus, anti-rootkits, patch management,
53-
server configuration and vulnerability management."
43+
risk: The effectiveness of configuration, patch and vulnerability management is unknown.
44+
measure: "Usage of Coverage- and control-metrics to show the effectiveness of the security program. Coverage is the degree in \n which a specific security control for a specific target group is applied with all resources.\n The control degree shows the actual application of security standards and security-guidelines. Examples are gathering information on anti-virus, anti-rootkits, patch management, server configuration and vulnerability management."
5445
difficultyOfImplementation:
5546
knowledge: 3
5647
time: 5
@@ -74,10 +65,8 @@ Monitoring:
7465
- Visualized metrics
7566
samm2: o-incident-management|A|1
7667
Defence metrics:
77-
risk: IDS/IPS systems like packet- or application-firewalls detect and prevent
78-
attacks. It is not known how many attacks has been detected and blocked.
79-
measure: Gathering of defence metrics like TCP/UDP sources enables to assume the
80-
geographic location of the requeist.
68+
risk: IDS/IPS systems like packet- or application-firewalls detect and prevent attacks. It is not known how many attacks has been detected and blocked.
69+
measure: Gathering of defence metrics like TCP/UDP sources enables to assume the geographic location of the request.
8170
difficultyOfImplementation:
8271
knowledge: 3
8372
time: 5
@@ -111,8 +100,7 @@ Monitoring:
111100
samm2: o-incident-management|A|2
112101
Screens with metric visualization:
113102
risk: Security related information is discovered too late during an incident.
114-
measure: By having an internal accessable screen with a security related dashboards
115-
helps to visualize incidents.
103+
measure: By having an internal accessible screen with a security related dashboards helps to visualize incidents.
116104
difficultyOfImplementation:
117105
knowledge: 2
118106
time: 1
@@ -124,8 +112,7 @@ Monitoring:
124112
samm2: o-incident-management|A|2
125113
Simple application metrics:
126114
risk: Attacks on an application are not recognized.
127-
measure: Gathering of application metrics helps to identify incidents like brute
128-
force attacks, login/logout.
115+
measure: Gathering of application metrics helps to identify incidents like brute force attacks, login/logout.
129116
difficultyOfImplementation:
130117
knowledge: 2
131118
time: 2
@@ -135,11 +122,8 @@ Monitoring:
135122
implementation: Prometheus
136123
samm2: o-incident-management|A|1
137124
Simple system metrics:
138-
risk: Without simple metrics analysis of incidents are hard. In case an application
139-
uses a lot of CPU from time to time, it is hard for a developer to find out
140-
the source with linux commands.
141-
measure: Gathering of system metrics helps to identify incidents and specially
142-
bottlenecks like in CPU usage, memory usage and hard disk usage.
125+
risk: Without simple metrics analysis of incidents are hard. In case an application uses a lot of CPU from time to time, it is hard for a developer to find out the source with linux commands.
126+
measure: Gathering of system metrics helps to identify incidents and specially bottlenecks like in CPU usage, memory usage and hard disk usage.
143127
difficultyOfImplementation:
144128
knowledge: 2
145129
time: 2
@@ -149,10 +133,8 @@ Monitoring:
149133
implementation: collectd
150134
samm2: o-incident-management|A|1
151135
Targeted alerting:
152-
risk: People are bored (irodiert) of incident alarm messages, as they are not
153-
responsbile to react.
154-
measure: By the defintion of target groups for incidents people are only getting
155-
alarms for incidents they are in charge for.
136+
risk: People are bored (ignorant) of incident alarm messages, as they are not responsible to react.
137+
measure: By the definition of target groups for incidents people are only getting alarms for incidents they are in charge for.
156138
difficultyOfImplementation:
157139
knowledge: 2
158140
time: 5
@@ -164,8 +146,8 @@ Monitoring:
164146
samm: OE1-B
165147
samm2: o-operational-management|B|3
166148
Visualized metrics:
167-
risk: Not vizualized metrics lead to restricted usage of metrics.
168-
measure: Metrics are vizualized in real time in a user friendly way.
149+
risk: Not visualized metrics lead to restricted usage of metrics.
150+
measure: Metrics are visualized in real time in a user friendly way.
169151
difficultyOfImplementation:
170152
knowledge: 1
171153
time: 2
@@ -178,11 +160,8 @@ Monitoring:
178160
samm2: o-incident-management|A|2
179161
Logging:
180162
Centralized application logging:
181-
risk: Local stored logs can be unauthorized manipulated by attackers with system
182-
access or might be corrupt after an incident. In addition, it is hard to perform
183-
an correlation of logs. This leads attacks, which can be performed silently.
184-
measure: A centralized logging system is used and applications logs (including
185-
application exceptions) are shipped to it.
163+
risk: Local stored logs can be unauthorized manipulated by attackers with system access or might be corrupt after an incident. In addition, it is hard to perform an correlation of logs. This leads attacks, which can be performed silently.
164+
measure: A centralized logging system is used and applications logs (including application exceptions) are shipped to it.
186165
difficultyOfImplementation:
187166
knowledge: 1
188167
time: 1
@@ -219,11 +198,8 @@ Logging:
219198
implementation: rsyslog, logstash, fluentd, bash
220199
samm2: o-incident-management|A|1
221200
Centralized system logging:
222-
risk: Local stored system logs can be unauthorized manipulated by attackers or
223-
might be corrupt after an incident. In addition, it is hard to perform a aggregation
224-
of logs.
225-
measure: By using centralized logging logs are protected against unauthorized
226-
modification.
201+
risk: Local stored system logs can be unauthorized manipulated by attackers or might be corrupt after an incident. In addition, it is hard to perform a aggregation of logs.
202+
measure: By using centralized logging logs are protected against unauthorized modification.
227203
difficultyOfImplementation:
228204
knowledge: 1
229205
time: 1
@@ -233,10 +209,8 @@ Logging:
233209
implementation: rsyslog, Logstash
234210
samm2: o-incident-management|A|1
235211
Correlation of security events:
236-
risk: Detection of security related events with hints on different systems/tools/metrics
237-
is not possible.
238-
measure: Events are correlated on one system. For example the correlation and
239-
visualisationof enhance login tries combined with successfull logins.
212+
risk: Detection of security related events with hints on different systems/tools/metrics is not possible.
213+
measure: Events are correlated on one system. For example the correlation and visualisation of failed login attempts combined with successful login attempts.
240214
difficultyOfImplementation:
241215
knowledge: 4
242216
time: 4
@@ -248,11 +222,8 @@ Logging:
248222
- Alerting
249223
samm2: o-incident-management|A|2
250224
Visualized logging:
251-
risk: System and application protocols are not visualized properly which leads
252-
to no or very limited logging assessment. Specally developers might have difficulty
253-
to read applications logs with unusually tools like the Linux tool 'cat'
254-
measure: Protocols are visualized in a simple to use real time monitoring system.
255-
The GUI gives the ability to search for specal attributes in the protocol.
225+
risk: System and application protocols are not visualized properly which leads to no or very limited logging assessment. Specially developers might have difficulty to read applications logs with unusually tools like the Linux tool 'cat'
226+
measure: Protocols are visualized in a simple to use real time monitoring system. The GUI gives the ability to search for special attributes in the protocol.
256227
difficultyOfImplementation:
257228
knowledge: 1
258229
time: 3

0 commit comments

Comments
 (0)