Skip to content

Commit 653ea74

Browse files
committed
Review Information gathering, level 1
1 parent e525891 commit 653ea74

2 files changed

Lines changed: 38 additions & 29 deletions

File tree

src/assets/YAML/default/InformationGathering/Logging.yaml

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -31,19 +31,20 @@ Information Gathering:
3131
- 8.15
3232
Centralized system logging:
3333
uuid: 4eced38a-7904-4c45-adb0-50b663065540
34-
risk:
35-
Local stored system logs can be unauthorized manipulated by attackers
36-
or might be corrupt after an incident. In addition, it is hard to perform
37-
a aggregation of logs.
38-
measure:
39-
By using centralized logging logs are protected against unauthorized
40-
modification.
34+
description: |
35+
Centralized system logging involves collecting and storing system logs from multiple sources in a secure, central location. This approach improves log integrity, simplifies monitoring, and enables efficient incident response.
36+
risk: |
37+
Locally stored system logs can be manipulated by attackers unauthorized or might be corrupt or lost after an incident. In addition, it is hard to perform aggregation of logs.
38+
measure: |
39+
- Implement a centralized logging solution for all critical systems.
40+
- System logs must be securely transmitted and stored in a central repository, protected from unauthorized access and modification.
41+
- Ensure that log collection is automated and covers all relevant system events.
42+
level: 1
4143
difficultyOfImplementation:
4244
knowledge: 1
4345
time: 1
4446
resources: 1
4547
usefulness: 2
46-
level: 1
4748
implementation:
4849
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/rsyslog
4950
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/logstash

src/assets/YAML/default/InformationGathering/Monitoring.yaml

Lines changed: 29 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -295,8 +295,11 @@ Information Gathering:
295295
comments: ""
296296
Simple application metrics:
297297
uuid: e9a6d403-a467-445e-b98a-74f0c29da0b1
298-
risk: Attacks on an application are not recognized.
299-
measure: |-
298+
description: |
299+
Collecting basic operational data from applications, such as authentication attempts, transaction volumes, and resource usage, will help detect abnormal patterns that may indicate security incidents or system issues.
300+
risk: |
301+
Without monitoring application metrics, attacks or abnormal behaviors may go undetected, increasing the risk of successful exploitation, data breaches, and delayed incident response.
302+
measure: |
300303
Gathering of application metrics helps to identify incidents like brute force attacks, login/logout patterns, and unusual spikes in activity. Key metrics to monitor include:
301304
- Authentication attempts (successful/failed logins)
302305
- Transaction volumes and patterns (e.g. orders, payments)
@@ -307,14 +310,16 @@ Information Gathering:
307310
Example: An e-commerce application normally processes 100 orders per hour. A sudden spike to 1000 orders per hour could indicate either:
308311
- A legitimate event (unannounced marketing campaign, viral social media post)
309312
- A security incident (automated bulk purchase bots, credential stuffing attack)
310-
313+
311314
By monitoring these basic metrics, teams can quickly investigate abnormal patterns and determine if they represent security incidents requiring response.
315+
assessment: |
316+
- Basic application metrics are collected and reviewed.
317+
level: 1
312318
difficultyOfImplementation:
313319
knowledge: 2
314320
time: 2
315321
resources: 2
316322
usefulness: 5
317-
level: 1
318323
implementation:
319324
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/prometheus
320325
references:
@@ -327,18 +332,21 @@ Information Gathering:
327332
comments: ""
328333
Simple budget metrics:
329334
uuid: f08a3219-6941-43ec-8762-4aff739f4664
330-
risk:
331-
Not getting notified about reaching the end of the budget (e.g. due to
332-
a denial of service) creates unexpected costs.
333-
measure:
334-
Cloud providers often provide insight into budgets. A threshold and
335-
alarming for the budget is set.
335+
description: |
336+
Monitoring resource usage and costs to prevent unexpected expenses. This is especially important in cloud environments where resource consumption can quickly exceed planned budgets.
337+
risk: |
338+
Failure to monitor budget metrics can result in unexpected costs, financial loss, and potential service disruption due to resource exhaustion or denial-of-service attacks.
339+
measure: |
340+
Set up budget monitoring and alerting for all critical resources. Use provider tools to track spending and configure alerts when thresholds are reached. Implement hard limits where possible to prevent budget overruns.
341+
assessment: |
342+
- The organization regularly monitors budget metrics
343+
- Alerting outside given thresholds are implemented
344+
level: 1
336345
difficultyOfImplementation:
337346
knowledge: 1
338347
time: 1
339348
resources: 1
340349
usefulness: 5
341-
level: 1
342350
implementation:
343351
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/collected
344352
references:
@@ -353,21 +361,21 @@ Information Gathering:
353361
comments: ""
354362
Simple system metrics:
355363
uuid: 3d1f4c3b-f713-46d9-933a-54a014a26c03
356-
risk:
357-
Without simple metrics analysis of incidents are hard. In case an application
358-
uses a lot of CPU from time to time, it is hard for a developer to find out
359-
the source with Linux commands.
360-
measure:
361-
Gathering of system metrics helps to identify incidents and specially
362-
bottlenecks like in CPU usage, memory usage and hard disk usage.
364+
description: |
365+
Monitoring basic system performance data, such as CPU, memory, and disk usage, will help identify performance bottlenecks and potential security incidents.
366+
risk: |
367+
Without monitoring system metrics, it is difficult to detect incidents or performance issues, leading to delayed response, reduced availability, and increased risk of undetected attacks.
368+
measure: |
369+
Collect and monitor key system metrics, including CPU, memory, and disk usage. Set up alerts for abnormal resource consumption or patterns that may indicate incidents or attacks.
370+
assessment: |
371+
- Basic system metrics are monitored and reviewed regularly
372+
- Alerting outside given thresholds are implemented
373+
level: 1
363374
difficultyOfImplementation:
364375
knowledge: 2
365376
time: 2
366377
resources: 2
367378
usefulness: 5
368-
assessment: |
369-
Are system metrics gathered?
370-
level: 1
371379
implementation:
372380
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/collected
373381
references:

0 commit comments

Comments
 (0)