Chapter 10. Security Monitoring
Security monitoring is a different beast than youâre familiar with if youâre coming from an infrastructure or application background. When it comes to monitoring an infrastructure, youâre instrumenting things that already exist. For example, your web servers already emit health and metrics data, and itâs a simple matter to store them and set up any necessary alerts. However, when it comes to security, many people find that the infrastructure and application werenât built with security in mind. There are no existing hooks to use, leaving many engineers in the unfortunate position of having to bolt on security after the factânot fun.
In some cases, there are entire classes of problems that no one solved for. As an example, how are you going to detect different DDoS signatures if you have no DDoS protection in place to begin with? As a result, unlike previous chapters, this chapter will straddle the line between how to build basic security and how to monitor it. There will be plenty of security approaches and tools I either gloss over or fail to mentionâsecurity monitoring is a specialized field unto itself and one that I cannot possibly do justice to in such a short chapter. If you find yourself interested in security monitoring and want to go deeper, I have found Richard Bejtlichâs The Practice of Network Security Monitoring (No Starch Press, 2013) to be invaluable.
Security is a matter of assessing threat and risk and deciding on ...
Get Practical Monitoring now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.