Gartner Research

Selecting Security Monitoring Approaches by Using the Attack Chain Model

Published: 06 August 2014

ID: G00264714

Analyst(s): Anton Chuvakin, Ramon Krikken

Summary

Implementing strong security monitoring requires an effective combination of technologies. This document compares monitoring approaches and technologies based on their effectiveness against malicious activities.

Table Of Contents

Comparison

Analysis

  • Aligning Security Monitoring to the Anatomy of Computer-Based Attacks
    • Using the Attack Chain Model
    • Accounting for Topology and Technology Attack Constraints
    • Protecting More Than Just Sensitive and Critical Assets
  • Use the Comparison Table to Plan: Creating a Security Monitoring Solution Road Map
    • Performing a Technology Gap Analysis
    • Performing a Technology Selection What-If Analysis
    • Prioritizing Technology Investment and Implementation

Guidance

  • Evaluate Monitoring Controls Based on Both Threat and Compliance Use Cases
  • Look at Attacks Independent From the Threats That Execute Them
  • Cover Both the Unauthorized Access and Unauthorized Use Attack Phase Clusters
  • Don't Buy More Monitoring Than You Specifically Need
  • Know Your Capabilities and Maturity Regarding Monitoring and Response

The Details

  • Drivers and Use Cases for Security Monitoring
    • Security Threat Drivers
    • Regulatory Compliance Drivers
    • Driver Convergence
    • Security Monitoring Use Cases
  • An Overview of Security Monitoring Solutions

Gartner Recommended Reading

©2020 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Become a client

Learn how to access this content as a Gartner client.