Innovative Lösungen für Ihren Geschäftserfolg.
Entdecken Sie Wissen, das bewegt.
Aktuelle Insights und Veröffentlichungen.
Entdecke deine Karrieremöglichkeiten bei Sogeti.
Mehrwert durch Technologie.
Beginnen Sie mit der Eingabe von Schlüsselwörtern, um die Website zu durchsuchen. Drücken Sie zum Absenden die Eingabetaste.
Generative KI
Cloud
Tesing
Künstliche Intelligenz
Sicherheit
How do digital leaders ensure the security and compliancy of their code, workflows, and infrastructure?
The paper 6 tips to integrate security into your DevOps practices advocates integrating your security team with the existing DevOps team to create DevSecOps. In a series of blog posts, we’re giving you a flavor of all 6 tips, including: Tip 3 : Monitor and observe continuously with purpose.
Too often, enterprises leverage a monitoring or observability solution without adapting it to work for their organization. When enterprises fail to fully plan their monitoring initiative, they overload themselves with data. This can be like looking for a digital needle in a haystack. What’s more, without gathering the right data in the right ways, data is often not actionable. The first step to enabling continuous monitoring — and growing the previously limited subset of intelligence — is strategic planning. In other words, purposeful monitoring and observation.
The whitepaper points to four factors for successful monitoring:
Monitoring provides the most value when you observe everything occurring within your enterprise, be it active directory, firewall, syslog, application log, etc. Gathering data from an incomplete selection of sources gives your business blind spots, so it’s important to collect infrastructure data coming from outside the change management process.
Successful organizations don’t just capture all their data; they organize it carefully. You’ll need to decide what to log based on potential targets. Consider the ‘signal-to-noise’ ratio when collecting data from various sources. For instance, the syslog from a backup server might not harbor useful information like the syslog of the server hosting the identity solution.
Use parameters to determine the baseline for any application, considering elements like user login/logout, network activity, system activity, transactions, etc. In general, log data should consist of who (user identity), when (activity start and end timestamp), what (activity performed), and where (source IP). In some instances, it’s an industry or security standard that dictates the logging requirement, e.g., PCI-DSS, ISO27001.
Azure Sentinel delivers Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) capabilities to Azure for both cloud native resources and on-prem resources. It’s also ready to integrate with non-Microsoft solutions using APIs.
Current systems generate more data and events than humans can interpret on their own. Too often, raw data is useless. Furthermore, collected events must be correlated together to provide a wider picture. The way to overcome these challenges is machine-driven monitoring.
Informed enterprises also use threat intelligence to gauge potential threats vs. recorded ones. Threat intelligence gathered from several sources about emerging and existing threats provides a greater understanding of threat capability, IOCs (Indicator of Compromise), and the tactics, techniques, procedures (TTPs), and mitigation controls to use against it.
From the need to carefully organize data and incorporate a robust toolchain built for modern threats, to a real-world use case for remediating proactively with automated threat alerts, Tip 3 offers a comprehensive elaboration of why monitoring and observing continuously with purpose should be part of the new DevSecOps way of working.
Download the white paper 6 tips to integrate security into your DevOps practices.
Global CTO of Cloud Services
Wir verwenden Cookies, um Ihre Erfahrung auf unserer Website zu verbessern. Sie helfen uns, die Leistung der Website zu verbessern, Ihnen relevante Werbung zu präsentieren und ermöglichen es Ihnen, Inhalte in sozialen Medien zu teilen.
Sie können alle Cookies akzeptieren oder sie einzeln verwalten. Sie können Ihre Einstellungen jederzeit ändern, indem Sie auf Cookie-Einstellungen in der Fußzeile jeder Seite klicken.
Weitere Informationen zu den Cookies finden Sie in unserer Cookie-Richtlinie.