Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Continuous Operations

July 26, 2021July 19, 2021 by admin

In order to support continuous operations, the following principles should be adopted as part of the security operations policies.

Audit logging: Higher levels of assurance are required for protection, retention, and lifecycle management of audit logs, adhering to applicable legal, statutory, or regulatory compliance obligations. Audit logging also provides unique user access accountability that can detect potentially suspicious network behaviors and/or file integrity anomalies, as well as forensic investigative capabilities in the event of a security breach.

The continuous operation of audit logging comprises three important processes:

  1. New events detection: The goal of audit logging is to detect information security events. Policies should be in place to define what a security event is and how to address each type of event.
  2. Adding new rules: Rules are built in order to allow detection of new events. Rules consist of the mapping of expected values to log files in order to detect events. In continuous operation mode, rules must be updated to address new risks.
  3. Reduction of false positives: The quality of the continuous operations audit logging is dependent on the ability to reduce over time the number of false positives in order to maintain operational efficiency. This requires constant improvement of the rule set.

Contract/authority maintenance: Points of contact for applicable regulatory authorities, national and local law enforcement, and other legal jurisdictional authorities shall be maintained and regularly updated as per the business need (e.g., change in impacted scope and/or a change in any compliance obligation) to ensure direct compliance liaisons have been established and to be prepared for a forensic investigation requiring rapid engagement with law enforcement.

Data governance (secure disposal): Policies and procedures shall be established with supporting business processes and technical measures implemented for the secure disposal and complete removal of data from all storage media, ensuring data is not recoverable by any computer forensic means.

Incident response legal preparation: In the event a follow-up action concerning a person or organization after an information security incident requires legal action, proper forensic procedures, including chain of custody, shall be required for preservation and presentation of evidence to support potential legal action subject to the relevant jurisdictions. Upon notification of a security breach, impacted customers (tenants) and/or other external business relationships shall be given the opportunity to participate as is legally permissible in the forensic investigation.

Information/Data Governance Types

The following lists a sample of information/data governance types. Note that this may vary depending on your organization, geographic location, risk appetite, etc.

Related

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!