Carnegie Mellon University – Best Practices for NTP Services 3.3 3.3.7 Audit and Accountability
This article talks about how NTP works, NTP vulnerabilities, and best practices; configuration of the NTP server.
This article talks about how NTP works, NTP vulnerabilities, and best practices; configuration of the NTP server.
This is a whitepaper from Cisco on the NTP Protocol.
This article lists Security Information and Event Management (SIEM) tools that provide log analysis and correlation of events. Caveat: Open source may be sufficient for some small companies but do not provide support and may offer only a limited feature set. Most of these open source solutions offer a paid option as well. If you try it and like it, upgrading to the paid option to gain support and features is easy.
This link provides a list of no or low cost log management tools.
This example procedure from the EPA shows how they iplement the security control requirements for the Audit and Accountability (AU) control family, as identified in NIST SP 800-53.
This article discusses the importance of collecting logs, why CMMC Control AU.L2-3.3.5 is important, and provides helpful resources to become compliant.
Gartner defines insider risk management (IRM) as the tools and capabilities to measure, detect and contain undesirable behavior of trusted accounts within the organization. In response to a recognized need to minimize the effects of unwanted activity within the organization and key partners, security and risk management leaders have to mitigate risk. This market consists of tools and solutions to monitor the behavior of employees, service partners and key suppliers working inside the organization, and to evaluate whether behavior falls within expectations of role and corporate risk tolerance. Insider risk may involve errors, fraud, theft of confidential or commercially valuable information, or the sabotage of computer systems.
This is Internet Engineering task force’s updated best practices for Network Time Protocol.
This is an article from logz.io that speaks to defining the elk stack, the importance, installation and configuration of it.
This document from Ubuntu discusses Logwatch, a tool that will monitor your server's logs and email the administrator a digest on a daily basis.