Reviewing multiple logs in addition to security scan results report
Security scanning reports need not be the only source of security related data. They can be correlated with other sources.
Such sources include:
Logs. There are different types of logs. Logs will show if there are attempts to exploit a vulnerability, or if that vulnerability is being used.
Security logs can be correlated with other logs.
Correlation of logs can be done with help of SIEM tools.
Comments
Post a Comment