IDG Security Report
The data flowing through the monitoring systems is, in itself, the most important asset to protect.
An attacker can compromise the operation of the assets on which critical services run; in a hospital, it can take diagnostic tests out of service, or in the case of public services it can cause a shutdown in basic supplies (e.g. energy or telecommunications). On the other hand, it can be done with critical or sensitive information; for example, medical reports or company transactions.
The report
This document aims to help organizations make their monitoring systems more secure by introducing security into monitoring conversations and decisions.
What topics will you learn about in our report?
.01
Importancia de la seguridad
Companies are increasingly aware of the importance of monitoring processes and services in order to better manage and control them. However, they do not perceive the need to introduce security in monitoring.
.02
Monitoring strategy
As monitoring projects increase, they begin to reveal technological aspects that have not received sufficient attention, such as lack of control or lack of knowledge about existing assets, and shortcomings in security.
.03
Asset evaluation
A monitoring strategy first involves cataloging and evaluating the organization’s technological assets. If there is no visibility over the assets, it is not possible to have control over the services.
.04
Basic safety principles
The starting point for securing monitoring systems is awareness of the need to incorporate security as a management element, rather than as a link in the chain of asset and service security.
.05
Architectural diagram
Security must be part of a monitoring architecture from its design, hence the need for a systematic approach that encompasses the different layers of the architecture.
.06
Secure base system
Pandora FMS issues a series of recommendations to perform a safe installation of all Pandora FMS components (and valid for any other monitoring system), based on RHEL7 / RockyLinux 8.x OS.