No Security Information and Event Management (SIEM) to manage and handle the security log
Risk Description
Without a SIEM system, it’s harder to detect attacks, investigate issues, predict risks, and follow security rules, making the system less secure.
Existing Controls
Basic Documentation
Risk Mitigation Policy
- Installing SIEM system and connect it to the all-network equipment and servers.
- Regularly (daily) check logs of suspicious activity.
- Use simpler tools to collect and review logs from different systems.
- Create automatic alerts for unusual activity like failed logins or strange network traffic.
- Periodically review security systems to make sure logs are being handled properly.
- Create a clear plan to respond to security issues.
- Make sure logs are stored securely and for the right amount of time.
- The security specialist should be trained on the Incident Response, Digital Forensics and SoC Analyst to deal with different types of alerts messages.
Location/Contact Person details
The chairman of risk management sub-committee in UTAS-SUR
Dr.Sami Al-Batashi, Phone: +968 9293 9604
Email: sami.albattashi@utas.edu.om
Risk Management Authority
Risk Management Committee in UTAS-SUR
Risk Likelihood
High
Risk Impact
High
Risk Level
High
Risk Incident Response Procedures
- Analyzing the logs to track the attack or the suspicious activities
- Writing the initial report to describe the security attacks include: Source of attack, time, which systems and data effected, victim files and the vulnerabilities executed to run the attack
- Containment, eradication and recovery to bring back the network and services to its former functionality.
- Activate automatic alerts when any hacking attempt or unusual activity is detected.
- Improving the incident response plan to prevent and deal with similar attack in future.
Risk Termination
By sending the final report explaining the problem causes and how we can mitigate next time.