Enterprise Cloud Security and Governance
上QQ阅读APP看书,第一时间看更新

Fifth layer – response layer

This is the layer where all the monitoring-related activities happen.

For example, someone logging in to a database server in the middle of the night is definitely a suspicious activity. If there are rules written to alert against a similar kind of predefined or correlation-based activity, then it is possible to prevent the attacker from doing any harm.

The tools that are part of this layer are generally SIEM systems.