-
作者Karen Kent@NIST, Murugiah Souppaya@NIST
-
简介
This publication seeks to assist organizations in understanding the need for sound computer security log management. It provides practical, real-world guidance on developing, implementing, and maintaining effective log management practices throughout an enterprise. The guidance in this publication covers several topics, including establishing log management infrastructures, and developing and performing robust log management processes throughout an organization. The publication presents log management technologies from a high-level viewpoint, and it is not a step-by-step guide to implementing or using log management technologies.
- Executive Summary
- Introduction
- Introduction to Computer Security Log Management
- Log Management Infrastructure
- Log Management Planning .
- Log Management Operational Processes
- Configure Log Sources
- Analyze Log Data
- Respond to Identified Events
- Manage Long-Term Log Data Storage
- Provide Other Operational Support
- Perform Testing and Validation
- Summary
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2016-03-13 13:37:01
-
2023-10-16 14:26:31.119995
-
2016-03-16 04:49:23
-
2016-03-16 04:16:40
附件下载
-
SP800.92(日志管理).pdf