18. Event Logging Best Practices

Different tools are used depending on whether the risk from the attack comes from traffic coming into or leaving the infrastructure.

Ingress Monitoring

Ingress monitoring refers to surveillance and assessment of all inbound communications traffic and access attempts. Devices and tools used for ingress monitoring include:

Egress Monitoring

Egress monitoring is used to regulate data leaving the organization’s IT environment.


discord :