CCST Cybersecurity Certification Cram Notes
5.0 Incident Handling
5.1. Monitor security events and know when escalation is required
1. SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) are two important tools that can help organizations monitor security events and escalate when necessary.
SIEM systems collect and analyze data from various sources, including network devices, servers, and applications. They use machine learning algorithms and rules-based analysis to identify security incidents based on predefined criteria. Once a potential security incident is detected, the SIEM system generates an alert to notify security analysts to investigate and respond appropriately.
SOAR systems, on the other hand, go beyond just alerting and can automate and orchestrate responses to security incidents. SOAR systems use predefined playbooks to automatically investigate and remediate security incidents, freeing up security analysts' time to focus on more complex tasks. SOAR systems can also integrate with other security tools to provide a unified view of an organization's security posture.
Both SIEM and SOAR (SOAR stands for Security Orchestration, Automation, and Response) systems can monitor network data, including packet captures and log file entries, to identify suspicious events as they occur. By analyzing this data, these systems can detect anomalies and patterns of behavior that may indicate a security incident.
However, it's important to note that these systems are not a silver bullet and should be used in conjunction with other security measures, such as vulnerability scanning, penetration testing, and employee training. It's also important to have a clear escalation plan in place, outlining how and when to escalate a security incident to the appropriate parties, such as senior management or law enforcement.
2. Monitoring network data to identify security incidents (packet captures, various log file entries, etc.),