PHASE 05
Monitoring
Identification
of critical assets
Asset identification information and critical systems. Establishment of safety requirements.
Identification
of critical assets
Collect and analyze event logs from systems and applications. Detect any suspicious activity.
Response
to incidents
Initiation of the incident response process if a security threat or incident is detected. Damage containment and mitigation.
Configuration of
monitoring
monitoring
Configuration of firewalls, antivirus, intrusion detection systems, among others.
Detection
intrusion detection
Identification of anomalous patterns and behaviors in the network.
Vulnerability
vulnerabilities
Periodic vulnerability analysis to identify and correct security weaknesses.
Effectiveness evaluation
Regular evaluation of the effectiveness of the monitoring process. Identification of areas for improvement. Adjustment of tools and processes as required.






