Implementation of application security monitoring should include the following components:
a. Generation of alerts from metrics indicating risks beyond established thresholds.
b. Categorization of risks based on business impact analysis and prioritized monitoring of high-impact risks.
c. Consideration of automation capabilities (when applicable) to streamline application security monitoring.
d. Reporting and/or dashboard to provide real-time visibility to security and business stakeholders on application security statuses.
e. Periodic review of monitoring capabilities and processes by a combined group of security, IT and, business stakeholders.
Identify and monitor security-related events within applications and the underlying infrastructure. Define and implement a system to generate alerts to responsible stakeholders based on such events and corresponding metrics.
Implementation of application security monitoring should include the following components:
a. Generation of alerts from metrics indicating risks beyond established thresholds.
b. Categorization of risks based on business impact analysis and prioritized monitoring of high-impact risks.
c. Consideration of automation capabilities (when applicable) to streamline application security monitoring.
d. Reporting and/or dashboard to provide real-time visibility to security and business stakeholders on application security statuses.
e. Periodic review of monitoring capabilities and processes by a combined group of security, IT and, business stakeholders.
Identify and monitor security-related events within applications and the underlying infrastructure. Define and implement a system to generate alerts to responsible stakeholders based on such events and corresponding metrics.