By Niren Shah
Last week, during a consulting engagement at a client, this question became an animated discussion for a considerable amount of time. We have been strong supporters of continuous monitoring from an asset standpoint, hence the topic of this article.
What does continuous monitoring from an asset standpoint mean anyway? From a conceptual level this means:
In order to answer the question in the title, you do not need all of this. A simple framework that compares past "discovery" scans with the current one would technically suffice (a lot of the vulnerability scanner products will allow you to do that to some extent). But then, you run into the question of how often do you need to run these scans for it to become "continuous": monthly, weekly, daily, hourly? In today's world of quick starting and stopping containers you could have an asset occasionally startup to do its dirty work and then terminate itself before being detected. Also, you would be doing yourself a disservice if you just looked for asset changes from such a narrow perspective.
What are the barriers to getting truly continuous asset monitoring? From our perspective, they are the following:
Where does your cyber framework stand from a continuous monitoring standpoint? Ask yourself the following questions: would you get alerted ...
To sum it up, if your cybersecurity monitoring framework is able to alert on the discovery of a new asset then you're ahead of the game already, give yourself a pat on the back and ask the follow up question: would you know if an asset behaved abnormally (i.e. let's say its event logging rate multiplied by 5x)?