<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: List of auditable network security events in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/List-of-auditable-network-security-events/m-p/32243#M2209</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/545444613"&gt;@N_Bakewell&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Here is a link to a Sans GIAC paper, which you may find useful:&amp;nbsp; &lt;A href="https://www.giac.org/paper/gcia/7008/logging-monitoring-detect-network-intrusions-compliance-violations-environment/115345" target="_blank"&gt;https://www.giac.org/paper/gcia/7008/logging-monitoring-detect-network-intrusions-compliance-violations-environment/115345&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Look at the check list at the end of the piece.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
    <pubDate>Sat, 01 Feb 2020 23:43:32 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2020-02-01T23:43:32Z</dc:date>
    <item>
      <title>List of auditable network security events</title>
      <link>https://community.isc2.org/t5/Tech-Talk/List-of-auditable-network-security-events/m-p/32216#M2196</link>
      <description>&lt;P&gt;Good afternoon,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am currently developing my company's list of auditable network security events - things that are monitored and caught through logs that warrant an administrator's attention.&amp;nbsp; For example, the creation of a new privileged account, a server restart, excessive volume of file transfer.&amp;nbsp; Some of these happen in real time - for example, the moment a new privileged account is created, the alert happens, and another administrator verifies the validity of the new account.&amp;nbsp; Some happen on a recurring basis - same example, I could say that every quarter we review all of the privileged accounts to ensure they are still accurate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I spent some time searching the internet and surprisingly didn't find anything overly useful.&amp;nbsp; So I come to you - do any of you know of a good repository of the most common events to monitor, so I can bounce my own list off of it?&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jan 2020 19:48:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/List-of-auditable-network-security-events/m-p/32216#M2196</guid>
      <dc:creator>N_Bakewell</dc:creator>
      <dc:date>2020-01-31T19:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: List of auditable network security events</title>
      <link>https://community.isc2.org/t5/Tech-Talk/List-of-auditable-network-security-events/m-p/32225#M2200</link>
      <description>&lt;P&gt;Have you tried looking for something like top SIEM alerts since it seems like all these things would be SIEM triggers.. just a thought..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John-&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jan 2020 21:40:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/List-of-auditable-network-security-events/m-p/32225#M2200</guid>
      <dc:creator>JKWiniger</dc:creator>
      <dc:date>2020-01-31T21:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: List of auditable network security events</title>
      <link>https://community.isc2.org/t5/Tech-Talk/List-of-auditable-network-security-events/m-p/32243#M2209</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/545444613"&gt;@N_Bakewell&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Here is a link to a Sans GIAC paper, which you may find useful:&amp;nbsp; &lt;A href="https://www.giac.org/paper/gcia/7008/logging-monitoring-detect-network-intrusions-compliance-violations-environment/115345" target="_blank"&gt;https://www.giac.org/paper/gcia/7008/logging-monitoring-detect-network-intrusions-compliance-violations-environment/115345&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Look at the check list at the end of the piece.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Sat, 01 Feb 2020 23:43:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/List-of-auditable-network-security-events/m-p/32243#M2209</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-02-01T23:43:32Z</dc:date>
    </item>
    <item>
      <title>Re: List of auditable network security events</title>
      <link>https://community.isc2.org/t5/Tech-Talk/List-of-auditable-network-security-events/m-p/33529#M2447</link>
      <description>&lt;P&gt;Thank you Caute_cautim. I had the same question too and did not find a practical answer. I will use the paper as a starting point.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2020 13:50:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/List-of-auditable-network-security-events/m-p/33529#M2447</guid>
      <dc:creator>GJCR5657</dc:creator>
      <dc:date>2020-03-10T13:50:58Z</dc:date>
    </item>
  </channel>
</rss>

