Preface

Our security team found a new way to make money. In 2006, after perfecting our enterprise malware monitoring, we began to deploy tools for monitoring Cisco’s infrastructure more deeply. In doing so, we found our team positioned to monitor applications in new ways. Weary of ignoring the risk presented by new ventures, we offered a solution: fund staff to monitor targeted risk areas, and handle the infrastructure ourselves. The solution paid off—our monitoring team has grown, and we’ve developed new techniques for finding and addressing the necessary risks of a growing enterprise.

In 2007, we shared this experience with our Forum for Incident Response and Security Teams (FIRST) buddies at the annual conference. Some say we chose that conference because it was being held in Seville, Spain, but we were just doing our part for the security community. We wanted a crowd, so we titled our presentation “Inside the Perimeter: 6 Steps to Improve Your Security Monitoring.” We received enough encouragement to repeat the presentation at the annual Cisco Networkers conference later that year, where we expanded the talk to two hours and packed the house with an enthusiastic audience. Feedback was positive, and we were asked to repeat it in Brisbane, Australia; Orlando, Florida; and Barcelona, Spain over the next several months. In the meantime, we felt we had enough ideas to fill a book, and the editors at O’Reilly agreed.

Our audiences told us they liked the presentations because they craved honest experience from security practitioners. We share the challenges you face; we’re on the hook for security, and have to prioritize resources to make it happen. We like reading authentic books—the ones that don’t try to sell us gear or consulting services—and we’ve endeavored to write this book with that angle. This book aims to share our experience, successes, and failures to improve security monitoring with targeted techniques.

What This Book Is Not

This book is not an introduction to network, server, or database administration. It’s not an introduction to security tools or techniques, either. We assume that you have a foundational understanding of these areas and seek to build on them via specialized application of them. If we lose you along the way, put a bookmark where you left off, and reference the following excellent books:

  • The Tao of Network Security Monitoring, by Richard Bejtlich (Addison-Wesley Professional)

  • Essential System Administration, by Æleen Frisch (O’Reilly)

  • Counter Hack Reloaded, by Ed Skoudis and Tom Liston (Prentice Hall PTR)

  • Computer Viruses and Malware, by John Aycock (Springer)

  • Writing Secure Code, by Michael Howard and David LeBlanc (Microsoft Press)

Get Security Monitoring now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.