Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

3/14/2013
09:51 PM
Wendy Nather
Wendy Nather
Commentary
50%
50%

Outsource Your Monitoring To The Business

Don't keep all of the fun to yourself

Weren’t you looking for an excuse to get out of reading logs? Well, here it is. Security monitoring takes many forms, and some of them are more appropriately done directly by the business.

One obvious example of this is Web usage. Department managers will generally know better than you do which kinds of sites are relevant to their work and which ones aren’t. Fantasy baseball league sites are a no-brainer, but what about news sites? If employees are spending a lot of time on The Wall Street Journal pages, they may be doing legitimate research -- or they may be goofing off. Only the supervisor can say for sure how much browsing or emailing is too much when compared to the staff’s actual assigned tasks.

Another aspect to monitoring is looking for violations of corporate policy. As a security professional, you should not be in the position of having to make a judgment call on the appropriateness of, say, political sites. The human resources people should have to do the monitoring; if they want to check out certain URLs that look iffy, they can have arguments among themselves about what constitutes "sexually oriented material" or what postings might reflect poorly on the organization. You should not be acting as the Bad Taste Police.

Executives need to understand traffic patterns on a high level; they should be able to spot anomalous business behavior. They may discover that a department is using data that they never knew it needed to access. And they can be the ones to tell you whether sending large mail attachments is normal, or when they expect heavy server loads because of new sales promotions. Whether it’s finding out who’s really behind the company Twitter account or spotting frequent contact with journalists, there’s business-related information that they should know about contained in the system and security logs.

This isn’t to say you should be redirecting all of your SIEM’s alerts to the reception desk. But you have enough on your plate just dissecting lower-level traffic and spotting malware without trying to interpret monitoring data in the context of the business. If a different team has more reason to react to certain types of events and knows more about them, then you should try to pull them into the monitoring. Data-sharing starts at home.

Wendy Nather is Research Director of the Enterprise Security Practice at the independent analyst firm 451 Research. You can find her on Twitter as @451wendy. Wendy Nather is Research Director of the Enterprise Security Practice at independent analyst firm 451 Research. With over 30 years of IT experience, she has worked both in financial services and in the public sector, both in the US and in Europe. Wendy's coverage areas ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8720
PUBLISHED: 2020-08-13
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.
CVE-2020-12300
PUBLISHED: 2020-08-13
Uninitialized pointer in BIOS firmware for Intel(R) Server Board Families S2600CW, S2600KP, S2600TP, and S2600WT may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-12301
PUBLISHED: 2020-08-13
Improper initialization in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-7307
PUBLISHED: 2020-08-13
Unprotected Storage of Credentials vulnerability in McAfee Data Loss Prevention (DLP) for Mac prior to 11.5.2 allows local users to gain access to the RiskDB username and password via unprotected log files containing plain text credentials.
CVE-2020-8679
PUBLISHED: 2020-08-13
Out-of-bounds write in Kernel Mode Driver for some Intel(R) Graphics Drivers before version 26.20.100.7755 may allow an authenticated user to potentially enable denial of service via local access.