Investigations can further assist in gathering vital information about security events, facilitate audit requests, and provide basic information about an environment and the processes and activities within it. Investigations can also facilitate investigations and incident response within LogRhythm’s Case Management tool. MAS-TRMG investigations can augment a change control process in identifying configuration changes and trying to understand the nature of them to determine whether they align with change procedures, along with their implications for MAS-TRMG compliance. Investigations can also be run to support user access management (provisioning/de-provisioning/termination), privilege user activity, vendor account management, on-boarding of new user access, and other activities. User lists within LogRhythm can align with existing user access provisioning and account classification within the company and can be updated at the completion of periodic MAS-TRMG access reviews.
The MAS-TRMG: Vulnerability Detail and other investigations related to potential malicious activity cover all log sources in your environment, but specifically require logs from network security systems such as anti- malware systems, security enforcing devices, and vulnerability detection systems. After they are configured correctly, investigations allow IT and security operations to not only deep dive into potential security events, but also to learn more about and continuously improve the FI’s overall compliance and cyber security program. Investigations can be added to a given Case to better understand the scope and impact of a given incident. This demonstration and understanding will help facilitate appropriate action and remediation.
Further, with an emphasis on managing third-party access within your environment, vendor related investigations are applied against all log sources across the environment that administer access to these accounts. The vendor account investigations look to deep dive into authentication and access activities within the environment to augment related MAS-TRMG control objectives.
Knowledge Base Content
MAS: Malware Detected Inv
MAS: Vulnerability Detected Inv
MAS: Attack Detected Inv
MAS: Rogue Access Point Inv
MAS: Acct Created, Used, Deleted Inv
MAS: Vendor Acct Authentication Failure Inv
MAS: Vendor Acct Authentication Success Inv
MAS: Vendor Acct Access Failure Inv
MAS: Vendor Acct Access Success Inv
MAS: Vendor Acct Disabled/Enabled Inv
MAS: Vendor Acct UAM Inv
Investigations are used to pull additional details from log sources related to events of interest. The MAS-TRMG Detail investigations can be used to monitor potential malicious activity to assist in reducing the mean time to detection and learn about vulnerabilities or exposure points within the environment. IT Security Operations and Management should look to leverage these investigations as a learning mechanism and a means to gather vulnerability data to implement controls to reduce the risk exposure.
On the vendor account side, IT Security Operations and Management should use these investigations to deep dive into vendor account activity within the environment to better understand ‘normal’ third-party activities and identify when these accounts go beyond their scope of operations within your environment. This investigation can also be used in access management to validate access within the environment against periodic reviews of third-party accounts.