Information Gathering -> Logging: Correlation of security events
Risk and Opportunity
Risk: Detection of security related events with hints on different systems/tools/metrics is not possible.
Opportunity: Events are correlated on one system. For example the correlation and visualization of failed login attempts combined with successful login attempts.
Dependencies: Visualized logging, Alerting
Usefulness and Requirements of this Activity
Required knowledge: High (two disciplines)
Required time: High
Required resources (systems): High
OWASP SAMM VERSION 2
- not explicitly covered by ISO 27001 - too specific