From: RSA
Asset monitoring is an essential activity for managing vulnerabilities in a network. It lets organizations discover which assets are on the network and maintain an up-to-date inventory of their status, along with details such as which software is running and its patch levels. According to the SANS Institute, frequent monitoring of critical assets is becoming more essential given the constant rate at which threats evolve. This allows organizations to quickly detect whether anything nefarious has occurred so that damage can be minimized. Continuous asset monitoring is also key to enabling mobility in the enterprise because it can discover all new devices as they connect to the network, even if it’s just for a short period. The most important assets that should be continuously monitored are those that are the most volatile, such as new versions of software or new machines, because they are what attackers look to take advantage of.
Government Initiatives that Encourage Continuous Monitoring
Governments are putting their weight behind the need for continuous monitoring. In the United States, federal agencies are required to adhere to guidelines developed by the National Institute of Standards and Technology. These guidelines cover the use of vulnerability management, malware detection, asset management, and configuration management systems, along with the use of tools that aggregate data into a central management console. This helps organizations gain a more robust awareness of their overall risk posture. The guidelines primarily require that agencies use continuous monitoring capabilities. The federal government has also identified continuous monitoring as a key cybersecurity policy, focusing on assets, configurations, and vulnerabilities. In the United Kingdom, continuous monitoring is mandated for all government agencies connecting to the secure government network, although they are less widely used by private-sector organizations.
Leave a Reply