This document discusses leveraging logging for threat detection. It begins by defining cyber threats and cyber attacks. It then discusses threat detection and some common methodologies like threat intelligence, signatures, anomalies, and machine learning. It describes how logging records events and some common things that can be logged, like user activity and security events. The document proposes using logs for threat detection by ingesting them into a security solution to create and trigger detection rules. It acknowledges some limitations of relying solely on logs and recommends corroborating with other threat detection methods.
Related topics: