Log reviews: The process of regularly reviewing logs to identify potential security threats and anomalies. It is used to monitor network activity and identify trends and patterns that may indicate a security breach. Examples include reviewing firewall logs for suspicious traffic patterns and system logs for unauthorized access attempts.
Categories: CC D5: Security Operations | CCSP D5: Cloud Security Operations | CISM D4: Incident Management | CISSP D7: Security Operations | Security+ D4: Security Operations | SSCP D3: Risk Identification Monitoring and Analysis
Related Articles: