Lesson 12
Lesson 12: Alerting and Monitoring
Incident Response
NIST Phases:
Preparation: Before incidents - setting up tools, policies, training, IR plansDetection: Identifying/noticing potential security issues - alerts, unusual activity, IDS/IPS triggersAnalysis: Investigating to understand scope, impact, cause - review logs, assess damageContainment: Stopping the spread - isolate systems, block IPs, disable accountsEradication: Removing threat completely - delete malware, terminate sessions, patch systemsRecovery: Restoring to normal operations - restore from backup, test systems, monitorLessons Learned: After resolution - post-incident review, update policies, generate reports
Forensics:
Chain of custody: Document each step from collection to courtDisk imaging: dd tool for creating forensic copies
Digital Forensics
Due Process & Legal Hold:
Forensics: Preserve evidence for legal useDue Process: Follow legal procedures and fairnessLegal Hold: Right to retain and seize digital assets
Acquisition Order of Volatility (most volatile first):
- CPU registers, cache
- RAM
- Network data
- Disk
- Backups
Memory Acquisition:
- Live memory capture tools (Volatility Framework)
- Collects RAM content, session keys, temporary files
Disk Imaging:
Live Acquisition: While system is runningStatic Acquisition: When system is shut down- Tools:
dd,dcfldd(adds hashing and logging)
Preservation:
Write Blockers: Prevent data modificationHashing: SHA-256 for integrity (compare source vs image)Chain of Custody: Document each stepTamper Evidence: Secure storage and bags
Reporting:
- Summarize evidence and conclusions
- Must be objective, repeatable, non-tampered
E-discovery: Process digital data (email, docs) for legal cases
Data Sources
Common Data Sources:
Memory & Disk: RAM, file systems, metadataHost Logs: Security, system, app logs (Windows Event Viewer, syslog, journald)Application Logs: App-level activities, endpoint alertsNetwork Logs: Firewall, IDS/IPS (Suricata)Packet Captures: Full traffic visibility (Wireshark)Metadata: File timestamps, email headers, web request/response headers
Dashboards:
Analyst View: Alerts for triageManager View: Status and summariesAutomated Reports: For compliance and executive decision-making
SIEM (Security Information and Event Management)
Log Collection:
Agent-Based: Installed on endpointsListener/Collector: Listens to syslog/NetFlowAggregation: Combine logs from various formatsNormalization: Standardize fieldsTime Sync: Align timestamps across sources
Examples: Splunk, Wazuh, Security Onion
Alerting and Correlation:
Static Rules: Trigger alerts on patterns or thresholdsCorrelation: Connect related events across sourcesThreat Feeds: Enrich alert context
Alert Tuning:
False Positive: Alert triggered without actual threatFalse Negative: Threat occurred but no alert triggeredTrue Positive: Correctly detected real threat
Tuning Techniques:
- Suppress noisy or redundant alerts
- Adjust sensitivity
- Redirect flood alerts
- Use machine learning for pattern detection
Monitoring Infrastructure
Tools/Methods:
SNMP Traps: Alert on hardware/software eventsNetFlow/IPFIX: Monitor traffic flow statistics (who talks to whom, port/protocol)Heartbeat Monitoring: Confirm system availabilityNetwork Monitors: Track appliance and link stateSystem Logs: Detect uptime, usage, errorsCloud Monitors: Detect cloud service outagesVulnerability Scanners: Check for missing patches/config issuesDLP Tools: Detect and prevent sensitive data exfiltration
Benchmarks and SCAP
SCAP (Security Content Automation Protocol): NIST standard for automated compliance scanning
Used With:
OVAL (Open Vulnerability and Assessment Language)XCCDF (Extensible Configuration Checklist Description Format)
Purpose: Detect misconfigurations, missing controls, deviations from standards
Testing Types
Tabletop Exercise: Walkthrough, no live systemsSimulation: Red team emulates attackerWalkthrough: Step-by-step response drill
Threat Hunting: Proactive detection of unknown threats using logs and intelligence, different from reactive incident response
All Content
Lesson 0: Study Tips and Resources
Study Tips and Resources
Lesson 1: Fundamental Security Concepts
Study Tips and Resources
Lesson 2: Threat Types
Study Tips and Resources
Lesson 3: Cryptographic Solutions
Study Tips and Resources
Lesson 4: Identity and Access Management (IAM)
Study Tips and Resources
Lesson 5: Enterprise Network Architecture
Study Tips and Resources
Lesson 6: Cloud & Zero Trust
Study Tips and Resources
esson 7: Resiliency and Site Security
Study Tips and Resources
Lesson 8: Vulnerability Management
Study Tips and Resources
Lesson 9: Network Security Capabilities
Study Tips and Resources
Lesson 10: Endpoint Security
Study Tips and Resources
Lesson 11: Application Security
Study Tips and Resources
Lesson 13: Analyze Indicators of Malicious Activity
Study Tips and Resources
Lesson 14: Security Governance Concepts
Study Tips and Resources
Lesson 15: Risk Management Processes
Study Tips and Resources
Lesson 16: Data Protection and Compliance Concepts
Study Tips and Resources