SlideShare a Scribd company logo
Log Data
Compliance and Security drivers
• I think organisations want to achieve better
Visibility Analytics and Cyber Security posture in
order to “remain in the game”
Compliance
Logs in Security and Compliance flare
• Risk management and assesment
• Audit trail
• Forensic
• Leak protection
• User right management
• Separation of duties
Security
• Incident responce/Management
• Identify/Analyse/Gather Evidence
• Users/Systems Auditing
• Forensic
• Leak Prevention/protection
• Blue/Red
• Business enablement
• APT
• Security and Compliance activities in an
organisation relay on visibility into the
organisations systems and data, this activities
have strong dependencies on Logged data
among other mechanisms used.
Example
• DBA
• Hard working Individual
• HR cleared
• Strong technically
• Wider access to system than “normal users”
Logs in Security and Compliance flare
• Targeted
• Advance Phishing Techniques
• Social Eng./Networks
• Reconnaissance
• InfoSec “Black market”
Logs in Security and Compliance flare
Organisation Facing difficult
questions as:
• Who AUDIT your DATA?
• Are you ready for answering (WhatWhereWhen)?
• Do you have a response capability?
• Are your people trained ?
• What happens WHEN you get compromised?
Logs in Security and Compliance flare
Log = Intelligence
Log = Evidence
Log = Accountability
http://datalossdb.org/statistics
Discover Indicators Of
Compromise for your information
Crown Jewels.
• Collecting Log information from Systems
Applications and Infrastructure provide us with
the power of knowledge and the ability to
evidence and answer as required.
What's “out there”…
◇ We use native auditing, it meets our needs…
◇ Can’t risk performance degradation or latency…
◇ The database/DATA is locked down, we trust the people who can
access it…
◇ Our database/DATA is encrypted…
◇ Its too complex, I would need to dedicate a headcount to manage it.
◇ It’s too expensive…
◇ Too early, only starting to look at such solutions…
◇ We don’t store sensitive data in our network…
• Organisations that are breached tend to be less compliant.
• Most attacks against databases involve:
• Compromising user accounts or
• Running queries within the privileges of the user
• Database/Data encryption can’t protect against these attacks
• Audit will provide the needed details to investigate a data breach event
(internal or external)
• If regulated (PCI, SOX…) then an audit trail is REQUIRED.
David Zilberberg
Thank You.

More Related Content

PPTX
Sensitive Data Exposure
PPTX
Database security
PPTX
Database Security Management
PPTX
Database security
PPT
Database Security
PPTX
Insider Threat Final Powerpoint Prezi
PDF
Best Practices for implementing Database Security Comprehensive Database Secu...
PPTX
Data Security Explained
Sensitive Data Exposure
Database security
Database Security Management
Database security
Database Security
Insider Threat Final Powerpoint Prezi
Best Practices for implementing Database Security Comprehensive Database Secu...
Data Security Explained

What's hot (19)

PPTX
DBMS SECURITY
PPTX
what is data security full ppt
PPTX
Database security
PPT
Database security
DOCX
Database Security Concepts | Introduction to Database Security
PPTX
In data security
PPT
Lesson10 Database security
DOCX
Data Security
PPT
Security Software
PDF
Database Security
PDF
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
PDF
Data Security
PPTX
Insider threat kill chain
PPTX
Data security
PPT
Database security
 
PPTX
Database Security And Authentication
PDF
Chapter 15 incident handling
PDF
Brochure Imperva Vormetric
PDF
Database security
DBMS SECURITY
what is data security full ppt
Database security
Database security
Database Security Concepts | Introduction to Database Security
In data security
Lesson10 Database security
Data Security
Security Software
Database Security
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Data Security
Insider threat kill chain
Data security
Database security
 
Database Security And Authentication
Chapter 15 incident handling
Brochure Imperva Vormetric
Database security
Ad

Viewers also liked (6)

PDF
Mis 510 cyber analytics project report
PPTX
Log analysis using Logstash,ElasticSearch and Kibana
PDF
From Zero to Hero - Centralized Logging with Logstash & Elasticsearch
PPTX
Elk stack
PDF
Logging with Elasticsearch, Logstash & Kibana
PPTX
Attack monitoring using ElasticSearch Logstash and Kibana
Mis 510 cyber analytics project report
Log analysis using Logstash,ElasticSearch and Kibana
From Zero to Hero - Centralized Logging with Logstash & Elasticsearch
Elk stack
Logging with Elasticsearch, Logstash & Kibana
Attack monitoring using ElasticSearch Logstash and Kibana
Ad

Similar to Logs in Security and Compliance flare (20)

PPTX
Aligning Application Security to Compliance
PPTX
Tsc2021 cyber-issues
PPT
Lecture data classification_and_data_loss_prevention
PPT
Lecture Data Classification And Data Loss Prevention
PPT
Data Classification And Loss Prevention
PDF
2010 za con_stephen_kreusch
PPTX
Insider threat v3
PDF
The MITRE ATT&CK "Collection" Tactic is Missing Very Important Techniques: D...
PPTX
Privacies are Coming
PDF
Data compliance - get it right the first time (Black/White printable PDF)
PDF
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
PDF
Data compliance - get it right the first time (Full color PDF)
PPTX
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PPT
Data security in the cloud
PPTX
Identity and Security in the Cloud
PDF
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
PDF
Microsoft Avanced Threat Analytics
PPTX
Privacies are coming
PPT
Data Protection, Humans and Common Sense
Aligning Application Security to Compliance
Tsc2021 cyber-issues
Lecture data classification_and_data_loss_prevention
Lecture Data Classification And Data Loss Prevention
Data Classification And Loss Prevention
2010 za con_stephen_kreusch
Insider threat v3
The MITRE ATT&CK "Collection" Tactic is Missing Very Important Techniques: D...
Privacies are Coming
Data compliance - get it right the first time (Black/White printable PDF)
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
Data compliance - get it right the first time (Full color PDF)
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
Data security in the cloud
Identity and Security in the Cloud
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Microsoft Avanced Threat Analytics
Privacies are coming
Data Protection, Humans and Common Sense

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
A Presentation on Artificial Intelligence
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Cloud computing and distributed systems.
Understanding_Digital_Forensics_Presentation.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
NewMind AI Monthly Chronicles - July 2025
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A Presentation on Artificial Intelligence
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectral efficient network and resource selection model in 5G networks
Building Integrated photovoltaic BIPV_UPV.pdf
Cloud computing and distributed systems.

Logs in Security and Compliance flare

  • 1. Log Data Compliance and Security drivers
  • 2. • I think organisations want to achieve better Visibility Analytics and Cyber Security posture in order to “remain in the game”
  • 5. • Risk management and assesment • Audit trail • Forensic • Leak protection • User right management • Separation of duties
  • 7. • Incident responce/Management • Identify/Analyse/Gather Evidence • Users/Systems Auditing • Forensic • Leak Prevention/protection • Blue/Red • Business enablement • APT
  • 8. • Security and Compliance activities in an organisation relay on visibility into the organisations systems and data, this activities have strong dependencies on Logged data among other mechanisms used.
  • 9. Example • DBA • Hard working Individual • HR cleared • Strong technically • Wider access to system than “normal users”
  • 11. • Targeted • Advance Phishing Techniques • Social Eng./Networks • Reconnaissance • InfoSec “Black market”
  • 13. Organisation Facing difficult questions as: • Who AUDIT your DATA? • Are you ready for answering (WhatWhereWhen)? • Do you have a response capability? • Are your people trained ? • What happens WHEN you get compromised?
  • 15. Log = Intelligence Log = Evidence Log = Accountability
  • 17. • Collecting Log information from Systems Applications and Infrastructure provide us with the power of knowledge and the ability to evidence and answer as required.
  • 18. What's “out there”… ◇ We use native auditing, it meets our needs… ◇ Can’t risk performance degradation or latency… ◇ The database/DATA is locked down, we trust the people who can access it… ◇ Our database/DATA is encrypted… ◇ Its too complex, I would need to dedicate a headcount to manage it. ◇ It’s too expensive… ◇ Too early, only starting to look at such solutions… ◇ We don’t store sensitive data in our network…
  • 19. • Organisations that are breached tend to be less compliant. • Most attacks against databases involve: • Compromising user accounts or • Running queries within the privileges of the user • Database/Data encryption can’t protect against these attacks • Audit will provide the needed details to investigate a data breach event (internal or external) • If regulated (PCI, SOX…) then an audit trail is REQUIRED.

Editor's Notes

  • #15: It is not "if u get compromised". The reality is "when u get compromised"
  • #20: Audit shouldn’t be seen as a burdensome Quarterly/Annual ritual that the organization must endure.