GPG-13 – Lists
List Name | ID | List Type | Description |
---|---|---|---|
GPG-13: All Log Sources | -2321 | Log Sources | This list should contain all log sources for the Entity concerned. |
GPG-13: APP and DB Admin List | -2318 | User | This list includes standard accounts or groups typically with administrative-based access for production environments. |
GPG-13: Application and Database Production Servers | -2320 | Log Sources | This list includes all in-scope, production application and database level servers within the boundary. |
GPG-13: Approved Wireless Access Points | -2312 | Log Sources | This list includes all approved wireless access points at the boundary. |
GPG-13: Authorized VPN Users | -2316 | Users | This list should be updated with any approved VPN users. |
GPG-13: Critical Servers | -2341 | Log Sources | This list should only be populated with those servers classified as Critical. |
GPG-13: Critical Workstations | -2304 | Log Sources | This list should only be populated with workstations classified as Critical |
GPG-13: File Integrity Monitoring | -2298 | Log Source | This list includes all production systems that generate file integrity monitoring logs including LogRhythm File Integrity Monitor. |
GPG-13: Host Anti-Malware | -2299 | Log Source | This list includes all host-based Anti-Malware within the internal boundary (workstations and servers). |
GPG-13: Internal Boundary Enforcing Devices | -1034 | Log Source | This list should contain Enforcing Devices that are on the internal boundary of a network (for example, IPS) |
GPG-13: Internal Monitoring Devices | -2319 | Log Source | This list should contain all internal Monitoring Devices (for example, IDS) inspecting traffic within an Impact Level rather than traffic traversing a security Boundary. |
GPG-13: Internal Network Devices | -2300 | Log Source | This list includes Internal network infrastructure devices. other than those devices which can be more accurately described by the lists 'Internal Monitoring Devices' and 'Internal Boundary Enforcing Devices' |
GPG-13: Network Connection Consoles | -2301 | Log Source | This list includes all consoles to which a network connection can be established. |
GPG-13: Remote Access Devices | -2310 | Log Source | This list should be updated with any log sources which could include logs from remote access activity. |
GPG-13: Security Boundary Anti- Malware Gateways | -2315 | Log Source | This list includes Anti-Malware gateway devices inspecting traffic traversing a Security Boundary. |
GPG-13: Security Boundary Content Gateways | -2303 | Log Source | This list includes content checking gateway devices (other than 'Security boundary Anti-Malware Gateways') inspecting traffic traversing a Security Boundary. |
GPG-13: Security Boundary Enforcing Devices | -2307 | Log Source | This list includes devices (for example, IPS, Firewalls) enforcing separation across a security boundary. |
GPG-13: Security Boundary Monitoring Devices | -2311 | Log Source | This list includes monitoring devices (for example, IDS) inspecting traffic traversing a security boundary. |
GPG-13: Servers and Workstations | -2314 | Log Source | This list should contain all servers and workstations within the environment classified as both critical and non-critical. |
GPG-13: UDLA – LREnhancedAudit | -2356 | Log Source | This list is configured to encompass UDLA LogRhythm AIE Rule changes. |
GPG-13: VPN Devices | -2322 | Log Source | This list should be updated to contain all VPN or related devices/clients. |
GPG-13: Wireless IDS | -2317 | Log Source | This list includes all Wireless Intrusion Detection Systems/Services (WIDS) within the boundary. |