Skip to main content

A-006 - Monitoring & Detection

Purpose

Provide visibility over system activity, security-relevant events and potential malicious behavior across the Scheol environment.

This capability supports detection of incidents, validation of controls and overall situational awareness.


Asset Type

  • Business Capability

Description

Monitoring & Detection covers the mechanisms used to observe infrastructure, collect logs and identify abnormal or suspicious activity.

At the current stage, monitoring is limited and mostly decentralized:

  • system and application logs are stored locally on individual hosts
  • no centralized log aggregation or correlation is in place
  • detection capabilities are minimal and largely manual

A centralized monitoring and detection stack (e.g. SIEM with log forwarding and correlation) is planned but not yet implemented.


Criticality

  • High

Monitoring is essential for:

  • detecting security incidents
  • validating control effectiveness
  • supporting investigation and response

Current limitations reduce the ability to detect and respond to threats in a timely manner.


Sensitivity

  • Sensitive

This asset involves:

  • log data (system, application, authentication)
  • operational and security events
  • potentially sensitive traces of user or system activity

Exposure Level

  • Internal only

Monitoring data is not exposed externally and remains local to each system.

However, lack of centralization reduces control over access and integrity of logs.


Trust Zone

  • Hybrid

Monitoring concerns:

  • Heaven (VPS logs, exposed services)
  • Hell (internal infrastructure, future SOC components)

Dependencies

  • All infrastructure and platform assets (log sources)
  • System logging mechanisms (syslog, application logs)
  • Future SIEM / monitoring stack (planned)
  • Network connectivity for log forwarding (planned)

Relationships

  • Identity & Access Management (authentication logs)
  • Administrative Access (privileged activity tracking)
  • All application and infrastructure assets
  • Future SOC components (Wazuh, TheHive, Cortex)

Security Position (Architecture Context)

  • Detection layer of the security model
  • Provides visibility across trust boundaries
  • Critical for validating controls and identifying compromise

Current structural weaknesses:

  • absence of centralized logging
  • no correlation or alerting capability
  • limited detection coverage
  • high dependency on manual review

Existing Protective Measures

  • Local system and application logs
  • Basic logging enabled on services (SSH, web, databases)

Limitations:

  • no log centralization
  • no integrity guarantees on logs
  • no automated detection or alerting
  • no unified visibility across assets

Owner / Responsibility

  • Security Role (Sec)

Notes

Monitoring & Detection is currently in an early and fragmented state.

Planned improvements include:

  • deployment of centralized logging and SIEM capabilities (e.g. Wazuh)
  • implementation of log forwarding from all systems
  • introduction of detection rules and alerting mechanisms
  • improved visibility across administrative and exposed components

This asset is critical for progressing toward a more mature and defensible security posture.