https://www.sans.org/white-papers/68/
This SANS whitepaper discusses several common practices which, when implemented together, will greatly decrease, and perhaps almost stop malware.
https://www.sans.org/white-papers/35932/
This SANS whitepaper examines the role of project management in building a successful vulnerability management program.
https://www.sans.org/white-papers/34180/
This SANS whitepaper looks at how a vulnerability management process could be designed and implemented within an organization.
SANS Whitepaper – A Practical Methodology for Implementing a Patch Management Process
3.14 3.14.1 System and Information integrity
https://www.sans.org/white-papers/1206/
This SANS whitepaper presents one methodology for identifying, evaluating and applying security patches.
https://securityintelligence.com/how-to-leverage-log-services-to-analyze-cc-traffic/
This article discusses how to utilize log services to detect attacks and indicators of attacks.
https://www.securitymetrics.com/blog/importance-log-management
This article describes how log management, identifying log types to collect and how log reviews will identify unauthorized access to organizational systems
https://www.sentinelone.com/blog/network-traffic-monitoring-7-best-tools-available/
This blog post describes the details of several network traffic monitoring tools.
https://www.stigviewer.com/stig/application_security_and_development/2018-04-03/finding/V-70187
This resource offers assessment guidance for a related control (NIST SP 800-53 SC-10)
https://cve.mitre.org
Common Vulnerabilities Exposure is a list of entries - each containing an identification number, a description, and at least one public reference - for publicly known cybersecurity vulnerabilities.
https://www.thiel.edu/ee2assets/2018-Computer_and_System_Logging_Policy.pdf
This is an example of a logging policy, including system and application logging elements that if logged correctly, will aid in identifying unauthorized access and use.