Documented configuration resources might include the following:
Network maps, cabling and wiring diagrams, application configuration specifications.Standard naming conventions used for computers.IP schema to track IP addresses.
Log Files
Generating
Transmitting
Storing
Analyzing
Disposing
Application Security
Logs
Operating System Logs
Physical Security
Fencing And Physical Barriers
Biometrics
Servilence
Guards and Escorts
Video and Electronic Surveillance
RFID and wireless surveillance
Security Assesment
Vulnerability Scanner
Categories
Network
Scanners
Application
Scanners
Web Application
Scanners
Intrusive and Credential Scans
Intrusive | Non- Intrusive
Credential | Non-Credentials
Security Automation
SIEM
Annotations:
The goals of a SIEM system for security monitoring are:
Identify internal and external threats.
Monitor activity and resource usage.
Conduct compliance reporting for audits.
Support incident response.
SOAR
Annotations:
SOAR has three important capabilities:
Threat and vulnerability management.
Security incident response.
Security operations automation.