RS.AN-08.329

Does your organization employ automated tools to detect indicators of compromise and evidence of persistence across your systems?

Explanation

Automated tools like endpoint detection and response (EDR), security information and event management (SIEM) systems, or threat hunting platforms should continuously monitor your environment for signs of malicious activity. These tools can identify unusual behaviors, known malware signatures, unauthorized access attempts, and persistent threats that may have established a foothold in your systems. Evidence of fulfillment could include documentation of deployed security tools with screenshots of dashboards showing active monitoring, reports generated by these tools showing scan results, or a written procedure detailing how and when automated scans are performed across your environment.

Implementation Example

Automatically run tools on targets to look for indicators of compromise and evidence of persistence

ID: RS.AN-08.329

Context

Function
RS: RESPOND
Category
RS.AN: Incident Analysis
Sub-Category
An incident's magnitude is estimated and validated

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron