Detect
An organisation’s ability to regularly assess the condition of their systems is critical to implementing timely remediation to detecting compromise and attempted attacks. The importance of this is demonstrated in the rising costs to organisations after breaches are finaly detected, the sooner a breach is detected a breach the smaller the impact it will have on the organisation
This involves assessing the processes and tools as well as independent verification through investigation and validation exercises.
The effectiveness of an organisation’s ability to gauge their system’s condition and detect compromise can be assessed through validation exercises as well as checking it’s processes and tools.
How are we detecting issues?
Implementing various protections is only part of the task, we need to know when and how they fail.
The detect function focuses on ensuring that anything untoward that occurs is detected in a timely manner and dealt with accordingly.
Key Outcomes.
- Ensuring Anomalies and Events are detected, and their potential impact is understood
- Implementing Security Continuous Monitoring capabilities to monitor cybersecurity events and verify the effectiveness of protective measures including network and physical activities
- Maintaining Detection Processes to provide awareness of anomalous events
These cover the majority of outcomes of a healthy detection process.
The ACSC Essential 8
Covering the 8 most effective areas your organisation can target to minimise potential cyber security incidents, Have us perform an Essential 8 Maturity Assessment on your organisation and get a head start on defending your organisation.