Skip to Content
Hands-On Security in DevOps
book

Hands-On Security in DevOps

by Tony Hsiang-Chih Hsu
July 2018
Intermediate to advanced
356 pages
9h 18m
English
Packt Publishing
Content preview from Hands-On Security in DevOps

Summary

In this chapter, we discussed using the NIST 800-92 Guide to Computer Security Log Management to define the logging policy. We also explored the key components of a security monitoring framework, such as the log collector, SIEM, and threat intelligence. The security monitoring framework requires a source of information logs. We also discussed the source of information and stated what we are looking for in the logs. The application logs, host security logs, database logs, vulnerability scanning results, network security logs, and web and email security logs are typically the source logs for security monitoring.

We also introduced the toolset that you need to build your own in-house threat intelligence framework. We apply the threat ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing DevOps

Securing DevOps

Julien Vehent
Kubernetes Security

Kubernetes Security

Liz Rice, Michael Hausenblas
Three Essentials for Agentic AI Security

Three Essentials for Agentic AI Security

Paolo Dal Cin, Daniel Kendzior, Yusof Seedat, Renato Marinho
Security Automation with Ansible 2

Security Automation with Ansible 2

Akash Mahajan, MADHU AKULA

Publisher Resources

ISBN: 9781788995504Other