Using the Linux Audit System to detect badness
In Summary : Security vendors have a mediocre track record in keeping their own applications and infrastructure safe. As a security produc...
https://updatesinfosec.blogspot.com/2018/05/using-linux-audit-system-to-detect.html
In Summary :
Security vendors have a mediocre track record in keeping their own applications and infrastructure safe. As a security product company, we need to make sure that we don’t get compromised. But we also need to plan for the horrible event that a customer console is compromised, at which point the goal is to quickly detect the breach. This post talks about how we use Linux's Audit System (LAS) along with ELK (Elasticsearch, Logstash, and Kibana) to help us achieve this goal.[...]
kindly refer the following link as follow up :
https://ift.tt/2KQRSh9
Security vendors have a mediocre track record in keeping their own applications and infrastructure safe. As a security product company, we need to make sure that we don’t get compromised. But we also need to plan for the horrible event that a customer console is compromised, at which point the goal is to quickly detect the breach. This post talks about how we use Linux's Audit System (LAS) along with ELK (Elasticsearch, Logstash, and Kibana) to help us achieve this goal.[...]
kindly refer the following link as follow up :
https://ift.tt/2KQRSh9