-
Notifications
You must be signed in to change notification settings - Fork 337
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"security posture" by assigning severity to events #125
Comments
Some notes:
|
I'm going to start spitballing a list of categories that could be assigned to logs. I'll edit this list as we come up with more of them, we'll assign severities later. Also, note that a lot of these same things are already visualizations in the security overview dashboards. One more note: these are on a per-log basis. We're not talking about bursts, trends, baselines, buckets, or anything here. Those kinds of things are a bigger issue and require some other machine learning or statistical analysis tool, and will be covered in another issue.
|
Kamino closed and cloned this issue to idaholab/Malcolm |
The idea is that we assign a severity rating to logs (all logs? some logs?)
So, imagine 1 - not severe at all (blue or green), 5 - super severe (red)
in Logstash enrichment we'd do stuff like:
cleartext password - 5
connection to naughty country - 5
certain notices - 5
insecure or old versions of protocols - 4
file transfers of certain mime types - 3
connection within subnet - 1
connection to other subnet - 2
connection to outside world - 3
etc.
Of course those are just examples. I'd need to hammer out a real list.
Then in some of the dashboards, we can have "number of red events" "number of green events" etc.
The text was updated successfully, but these errors were encountered: