NSA Issues Tips for Better Logging, Threat Detection in LotL Incidents

  /     /     /  
Publicated : 23/11/2024   Category : security


NSA Issues Tips for Better Logging, Threat Detection in LotL Incidents


The guidance is part of a coordinated, global effort to eradicate living-off-the-land techniques used against critical infrastructure.



The National Security Agency (NSA) released a publication detailing best practices for event logging and threat detection against threat actors using
living-off-the-land (LotL) techniques
.
The document details best practices
to improve security in cloud services, enterprise networks, mobile devices, and operational technology (OT) networks, and to ensure critical infrastructure remains robust, the agencies said. The document was jointly released by the NSA along with its counterparts in Australia, Canada, Japan, New Zealand, Singapore, and South Korea.
It is essential for organizations to strengthen their resilience against living off the land techniques that are pervading todays cyber threat environment,
said David Luber
, NSA cybersecurity director. By implementing an effective logging solution, the security and resilience of systems as well as incident response programs will be improved, he added. 
The guidelines are directed toward senior IT decision makers, operational technology operators, and network administrator and operators, and focus on enterprise-approved logging policy; centralized log access and correlation; secure storage and log integrity; and detection strategy for relevant threats.

Last News

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
NSA Issues Tips for Better Logging, Threat Detection in LotL Incidents