This chapter covers the following topics:
4.0 Security Architecture and Tool Sets
4.3 Given a scenario, review security architecture and make recommendations to implement compensating controls.
Security Data Analytics: Discusses data aggregation and correlation, trend analysis, and historical analysis.
Manual Review: Covers reviewing firewall logs, Syslogs, authentication logs, and event logs.
Defense in Depth: Discusses the application of the defense-in-depth principle ...