You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: data/Informationgathering.yml
+6-2Lines changed: 6 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,8 @@ Monitoring:
32
32
- 12.6.1
33
33
Alerting:
34
34
risk: Incidents are discovered after they happend.
35
-
measure: Thresholds for metrics are set. In case the thresholds are reached, alarms are send out. Which should get attention due to the critically.
35
+
measure: |
36
+
Thresholds for metrics are set. In case the thresholds are reached, alarms are send out. Which should get attention due to the critically.
36
37
difficultyOfImplementation:
37
38
knowledge: 2
38
39
time: 5
@@ -79,7 +80,9 @@ Monitoring:
79
80
- 12.1.3
80
81
Defence metrics:
81
82
risk: IDS/IPS systems like packet- or application-firewalls detect and prevent attacks. It is not known how many attacks has been detected and blocked.
82
-
measure: Gathering of defence metrics like TCP/UDP sources enables to assume the geographic location of the request.
83
+
measure: |
84
+
Gathering of defence metrics like TCP/UDP sources enables to assume the geographic location of the request.
85
+
Assuming a Kubernetes cluster with an egress-traffic filter (e.g. IP/domain based), an alert might be send out in case of every violation. For ingress-traffic, alerting might not even be considered.
0 commit comments