© Morey J. Haber, Darran Rolls 2020
Morey J. Haber and Darran RollsIdentity Attack Vectorshttps://doi.org/10.1007/978-1-4842-5165-2_9

9. Indicators of Compromise

Morey J. Haber and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 
There are plenty of solutions that can help provide indicators of compromise (IoC). Some will highlight the IP address of an asset, the malware detected, or even unusual patterns in user behavior. All of these can be mapped back to the three pillars of cybersecurity discussed earlier in the book. The goal of IoC is to identify when something is inappropriate in an environment, what evidence supports the anomaly, and potentially the root cause from malware to insider threat. With this in mind, there are four aspects ...

Get Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.