Secure Delivery Playbook
Equal ExpertsContact UsPlaybooks
  • Overview
  • Introduction
    • How is this different?
    • Security Engineers and Security Champions
  • Principles
  • Practices
    • Organise
      • Scaling Security
      • Vulnerability Management
      • Incident Response
      • Training
      • Compliance & Policy
      • Intelligence
    • Build
      • Inception
      • Stories & Epics
      • Security in the Pipeline
      • Periodic Review
    • Operate
      • Environment Provisioning
      • Security of the Pipeline
      • Security Testing in Production
      • Detection & Response
  • Contribute
    • Contributors
    • How to contribute
Powered by GitBook
On this page
  • Centralise monitoring and alerting
  • Use intrusion detection
  • Use honeypots for active detection
Export as PDF
  1. Practices
  2. Operate

Detection & Response

PreviousSecurity Testing in ProductionNextContribute

Last updated 5 years ago

Centralise monitoring and alerting

Logging and monitoring provide visibility into the runtime behaviour of the product. Centralising logging and monitoring data makes it easier to understand and manage the product. It also makes it harder for an attacker to cover their tracks. Propagating relevant identifiers throughout logging and monitoring data ensures events can be accurately correlated, for example, for a user, virtual machine, session, request, etc.

All systems that a team is responsible for should feed application and infrastructure logs into their centralised monitoring system, and alerts should be configured to notify the delivery team when exceptional behaviour occurs.

Use intrusion detection

Application and infrastructure logs provide a rich set of data to operate the product, but don't always highlight when patterns of behaviour resemble a potential security incident. Using intrusion detection tools increases your ability to spot and alert on suspicious behaviour as early as possible.

When running in a cloud platform, it is valuable to consume the cloud provider's native security monitoring services, such as and . In addition, other tools are available such as , , , , , , etc.

Use honeypots for active detection

Sometimes it can be hard to separate out the signal from the noise, and it's difficult to know for certain whether some activity was conducted maliciously. Honeypots, and various similar techniques, give you a strong indication of malicious behaviour as they involve setting up resources that would never be accessed or used under normal conditions. When honeypots are accessed or used, analysis of the attacker's activity can be gathered to improve understanding of attacks and spot attacks against other normal resources. They also provide additional evidence to support legal proceedings.

Numerous techniques can be used to lure attackers into traps that immediately alert you to their presence. Examples include decoy login or payment forms, fake nodes on the network that present themselves as potential targets for attack, and even entire networks that are exclusively used to detect attackers conducting network reconnaissance.

Examples:

AWS Trusted Advisor
AWS GuardDuty
Sysdig Secure
Sysdig Falco
Twistlock
Aqua Security
OSSEC
Osquery
Thinkst Canary
Canarytokens
CyberChaff