Skip to main content
Skip table of contents

GDPR User Guide – Investigations

Investigations can further assist in gathering vital information about security events, and provide basic information about an environment and the processes and activities within it. GDPR investigations can be part of a change control process in identifying configuration changes and trying to understand their nature to determine whether they are appropriate, along with their implications for GDPR compliance. Investigations can also be run to leverage defined user lists and examine any suspicious or potentially malicious activities surrounding accounts within the environment. Custom investigations can be configured in addition to those included within this module.

Log Requirements

The CCF: Vulnerability Detail and other investigations related to potential malicious activity cover all log sources in your environment, but specifically require logs from network security systems such as anti-malware systems, security enforcing devices, and vulnerability detection systems. After they are configured correctly, investigations allow IT and security operations to not only deep dive into potential security events but also to learn more about and continuously improve your overall compliance and cyber security program.

Further, various changes within data storage, security, and production environments must follow change control procedures to ensure business continuity and appropriate security protocols are not negatively impacted.

Sample Knowledge Base Content

IDName
675CCF: Config/Policy Change Inv
677CCF: Malware Detected Inv
678CCF: Patch Activity Inv
681CCF: Signature Activity Inv
684CCF: Vulnerability Detected Inv
685CCF: Suspicious Users Inv
686CCF: Use of Non-Encrypted Protocols Inv
690CCF: Compromise Detected Inv
695CCF: Social Media Inv

Recommended Actions

Investigations are used to pull additional details from log sources related to events of interest. The GDPR Investigations can be used to monitor potential malicious activity to assist in reducing the mean time to detection and learning about vulnerabilities or exposure points within the environment. IT Security Operations and Management should look to leverage these investigations as a learning mechanism and a means to gather vulnerability data to implement controls, reducing the risk exposure.

On the change control side, the goal is to support IT Operations & Security to ensure adherence to change control procedures. Deep diving into patch and signature management helps determine appropriate security protocols that are updated to foster business continuity and begin to establish a stronger security posture as an organization.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.