« 
Microsoft publishes advis... | 
Critique of NIST Guide to... »
                        
                            NIST Publishes Recommendations on Computer Security Log Management
                        
                            Tue, 23 May 2006 15:30:04 GMT
                        
                            
    I just learned from the EventTracker Newsletter about a new draft recommendations document from the National Institute of Standards and Technology entitled "Guide to Computer Security Log Management".
    This 64 page document could be an influential piece of work for log management solutions and certainly something you shouldn’t ignore if you are implementing a log management system in your organization.
    You can download the document from http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf. 
    This project and the SANS Log Management Summit (see earlier post) and the popularity of my security log encyclopedia and course demonstrate that they day of the security has come!
  
                         
                        
                            
                            
                                                       
                            
                        
                        
                                
                                
                        
                            
                            email this
                            •
                            
                            digg
                            •
                            
                            reddit
                            •
                            
                            dzone
                            
                            
                            
                            comments (0)
                            •
                            references (0)
                            
                            
                        
                        
                            Related:
                            Auditing Privileged Operations and Mailbox Access in Office 365 Exchange Online
Severing the Horizontal Kill Chain:  The Role of Micro-Segmentation in  Your Virtualization Infrastructure 
5 Indicators of Endpoint Evil
Anatomy of a Hack Disrupted: How one of SIEM’s out-of-the-box rules caught an intrusion and beyond
                        
                    
                    Comments disabled
powered by Bloget™