Security Monitoring

The topic of incident response was discussed in the previous chapter. In this chapter, we will introduce some security monitoring techniques. The objective of this chapter is to prepare our security monitoring mechanism to protect and prevent our cloud services from being attacked. To be prepared for this, our security monitoring procedures should include logging, monitoring the framework, threat intelligence, and security scanning for malicious programs. The topics that will be covered in this chapter are as follows:

  • Logging policy
  • Security monitoring framework
  • Source of information
  • Threat intelligence toolset
  • Security scanning toolset
  • Malware behavior matching—YARA

Get Hands-On Security in DevOps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.