Today's #CyberSecuirtyAwarenessMonth topic is choosing the highest priority log sources for your #SecOps needs. Unfortunately there is no "one size fits all" concept here, every organization has different needs and prorities. However, most organizations will see significant value with these data sources as a starting point:
- Active Directory (or other central auth system)
- Cloud Native Infrastructure
- Endpoint Detection and Response
- Firewall
- Multi-Factor Authnentication
- Web Proxy (or related solution)
This list gets you coverage for a wide variety of key data relevant in almost any cyber security instance. Add other data sources as appropriate in your environment.