Skip to Content
Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD
book

Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

by Davi Ottenheimer, Matthew Wallace
May 2012
Intermediate to advanced
456 pages
12h 6m
English
Wiley
Content preview from Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

Chapter 7

Logging and Orchestration

Evil events from evil causes spring.

—Aristophanes

You can't play a symphony alone; it takes an orchestra to play it.

—Navjot Singh Sidhu

Log and event management is an essential component of cloud compliance. Collecting and analyzing logs can help you answer key questions about who or what is accessing your environment and what, if anything, was changed. You should ask yourself these questions before the auditors do.

Orchestration is a major underpinning of cloud services. The scale, agility, and self-service associated with cloud services require it. Orchestration involves finding areas of operations to reduce the overall amount of effort required to perform business-related functions. It eliminates certain repetitive tasks by automating the selection of common and easily assembled choices or using information from one component to configure other components.

Logging Events

Security Information and Event Management (SIEM) is a broad term that encompasses managing information about the security of your environment. You can distill SIEM to a few simple questions:

  • What is the current state of your environment?
  • What just happened?
  • Was it in compliance with your policies?

It's that simple. The simplicity of the task, however, belies the complexity of accomplishing it in practice. With hundreds of products producing logs; myriad IT policies about access; dozens of products for consuming, analyzing, and reporting on logs; along with a host of orchestration ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

Mike Harwood
Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design

Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design

Denise Helfrich, Lou Ronnau, Jason Frazier, Paul Forbes

Publisher Resources

ISBN: 9781118239261Purchase book