Skip to main content

FIM QQ

How many systems will need to be monitored with FIM?
Which type of architecture will need to be deployed?
Which Operating Systems will require monitoring?
Does your environment leverage central configuration management?

How will FIM alerts be evaluated?
Does FIM logs to be sent to a centralized log repository?

Who will monitor and approve changes for FIM? 

What reports should be developed and who should receive these? 

Is FIM required to meet regulatory or standards requirements?

How will FIM be tuned and who will be responsible for identifying new FIM signatures?
Will a SIEM solution be utilized within the environment?


Do you have any PCI DSS requirements? Do you process, store, or forward credit card information?

Do you have a compliance need to test and verify the security of your systems? How do you know if the security measures in place are working? Can you verify that you will know if file or object-level changes occur accurately on servers?
Do you have a regulatory mandate to maintain an audit trail of who made changes to servers and what changes were made?

Do you have a manual or homegrown change reporting process today? Do you know the overhead of managing this type of isolated system?  

Comments

Popular posts from this blog

LinuxGuruz Netfilter IPTABLES Firewall Page

The Netfilter Project Homepage http://www.netfilter.org Source Code Userspace code (tar.bz2) http://www.netfilter.org/files/iptables-1.3.0.tar.bz2 FAQ Netfilter/Iptables FAQ http://netfilter.samba.org/documentation/FAQ/netfilter-faq.html Firewall Forensics (What am I seeing?) FAQ http://www.robertgraham.com/pubs/firewall-seen.html Network Intrusion Detection Systems - IDS http://www.robertgraham.com/pubs/network-intrusion-detection.html Sniffing (network wiretap, sniffer) FAQ http://www.robertgraham.com/pubs/sniffing-faq.html Linux IP Masquerade FAQ http://en.tldp.org/HOWTO/IP-Masquerade-HOWTO/ Firewall Admins Guide to Porn FAQ http://www.robertgraham.com/pubs/firewall-pr0n.html Hacking Lexicon - hacking dictionary http://www.robertgraham.com/pubs/hacking-dict.html Submit a FAQ Link or URL http://www.linuxguruz.com/iptables/#links Scripts Home LAN masquerading http://the-devil.dnsalias.net/home/extremist_MASQ Home LAN ip6t...

ESS

ESS is uniquely qualified to help you secure a new era of computing with: ·          Intelligence  – Enterprise security portfolio, with our expert field professionals, are unmatched in their ability to provide the deep analytics needed to ward off the wide range of threats ·          Integration  – Solutions and services systematically integrate both new and existing security capabilities, giving critical visibility, providing comprehensive controls, and reducing complexity ·          Expertise  – Expertise stems from our hands-on professionals and researchers whose know-how is built into our products and services, provided through real-time client feeds and embedded in our professional engagements