Verify that the monitoring is working as intended. a) Check that log settings are working and that the collection works as expected. b) Ensure that all systems which regularly store security-relevant data have sufficient storage space so that crucial data is not lost. c) Use a standardised format so that data can easily be read by third-party log analysis tools.
Use a standardized log format. This simplifies integration between logs and third-party log analysis tools, making it easier and, in some cases, even possible.
Security systems (e.g. firewall, malware protection) often have the ability to record a log of events. At regular intervals, make sure that a comprehensive log is accumulated and try to identify suspicious activity. The log is also useful in investigating disturbances or violations.
The operation of information systems may depend on certain key resources, such as server capacity,storage space, data processing capacity,monitoring capacity or certain< em>key people.
The organization has defined key resources and methods for monitoring the use of these key resources. A normal level is also determined for the resources, which is used when assessing the risk of jeopardizing availability due to capacity problems.