Instructions
Fill out this sheet as you progress through the lab and discussions. Hold your worksheets until the end to turn them in as a final submission packet.
Resources / Important Links
- https://promlabs.com/promql-cheat-sheet/
- https://www.sans.org/information-security-policy/
- https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/
Downloads
The worksheet has been provided below. The document(s) can be transposed to
the desired format so long as the content is preserved. For example, the .txt
could be transposed to a .md
file.
Unit 7 Recording
Discussion Post #1
Read about telemetry, logs, and traces. Ther are many good sources, even from Microsoft: https://microsoft.github.io/code-with-engineering-playbook/observability/log-vs-metric-vs-trace/
-
How does the usage guidance of that blog (at bottom) align with your understanding of these three items?
-
What other useful blogs or AI write-ups were you able to find?
-
What is the usefulness of this in securing your system?
Discussion Post #2
When we think of our systems, sometimes an airgapped system is simple to think about because everything is closed in. The idea of alerting or reporting is the opposite. We are trying to get the correct, timely, and important information out of the system when and where it is needed.
Read the summary at the top of: https://docs.google.com/document/d/199PqyG3UsyXlwieHaqbGiWVa8eMWi8zzAn0YfcApr8Q/edit?tab=t.0
-
What is the litmus test for a page? (Sending something out of the system?)
-
What is over-monitoring v. under-monitoring? Do you agree with the assessment of the paper? Why or why not, in your experience?
-
What is cause-based v. symptom-based and where do they belong? Do you agree?
Submit your input by following the link below.
The discussion posts are done in Discord Forums.
Definitions
Telemetry
Tracing
- Span
- Label
Time Series Database (TSDB)
Queue
Upper control limit / Lower control limit (UCL/LCL)
Aggregation
SLO, SLA, SLI
Push v. Pull of data
Alerting rules
Alertmanager
- Alert template
- Routing
- Throttling
Monitoring for defensive operations
- SIEM
- Intrusion Detection Systems - IDS
- Intrusion Prevention Systems - IPS
Digging Deeper
-
Look into Wazuh: Security Information and Event Management (SIEM). Real Time Monitoring | Wazuh
- What are their major capabilities and features (what they advertise)?
- What are they doing with logs that increases visibility and usefulness in the security space? Log data analysis - Use cases · Wazuh documentation
Reflection Questions
-
What do I mean when I say that security is an art and not an engineering practice?
-
What questions do you still have about this week?
-
How are you going to use what you've learned in your current role?