Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page215/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   211   212   213   214   215   216   217   218   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 258 of 425

that system etc.
It provides more real-time information (as opposed to simply historical logs) of detectable and observable events in the network, and does not rely on the detection of known signatures only. He recommends that the EDR be centrally managed, bringing him in agreement with Dr Lim’s recommendation for the implementation of what he refers to as managed EDR” (“MDR”). MDR allows for the achievement of enterprise network visibility for more effective detection of advanced cyber threats. More than simply EDR, MDR collects, correlates and analyses all data obtained within an EDR, and can determine communications and movements between endpoints indifferent parts of the network. The system runs on two levels there are software agents that run in the background on endpoints, and a centralised endpoint security management
system that monitors and controls the agents. In essence, MDR allows a look at the bigger picture – a holistic look at data on a system level.
37.3.1
Detection
745. EDR tools work by monitoring endpoint and network events, and recording this data for analysis, detection, investigation, reporting and alerting. Such tools use sophisticated analytics that identify patterns and detect anomalies in the network, including rare processes, strange or unrecognised connections, or other risky activities that are flagged based on baseline comparisons. This monitoring process can be automated, and anomalies will trigger alerts for immediate action or further investigation. Instead of being a signature-based system, EDR systems use anomaly-based detection which compares definitions of what is considered normal activity, with observed events, in order to identify significant deviations. As explained by Vivek, this detection method can be very effective at identifying previously unknown threats. Defending networks from cyber attacks necessitates a comprehensive
EDR system which should meet the following criteria a) Has comprehensive detection that (i) leverages on security analytics to identify threats, and (ii) automates threat detection across the Cyber Kill Chain.



Download 5.91 Mb.

Share with your friends:
1   ...   211   212   213   214   215   216   217   218   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page