-
-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Identify tooling for auditing access controls to infrastructure #2968
Comments
Note: Eclipse have a |
Miro diagram of potential monitoring approaches.. https://miro.com/app/board/uXjVMSLkAYY=/ , currently working on a document with some details and potential options for discussion. |
As this has now been discussed, the next step is to provide a detailed breakdown of the next steps. This will be covered by this Epic #3047 and particular task 2, next steps and more detailed breakdown of tasks required to implement. |
In order to detect threats and understand the use of our machines we need to identify what attempts are being made to access our machines and ensure we follow up on entries in the logs. Some of this may be feasible with Nagios, or we can identify other tooling that fulfils this role. Eclipse have some tooling in this area, but it is closed and not directly available for us to use at present.
The text was updated successfully, but these errors were encountered: