Chapter 15 ยท Part C

Monitoring & Incident Response Core

Detecting breaches, responding to them, and recovering. This is where "accounting" from Chapter 8 becomes a real defence instead of just log files gathering dust.
Logs = records of events ("user X logged in", "file Y accessed"). Monitoring = actively watching logs and alerts for suspicious activity. SIEM (Security Information and Event Management) = software that centralises and correlates logs from many sources. Incident Response (IR) = the structured process of dealing with a breach: Prepare โ†’ Identify โ†’ Contain โ†’ Eradicate โ†’ Recover โ†’ Lessons Learned. Almost every major breach was "in the logs" โ€” the failure was not watching them.

15.1 Why Monitoring Matters

You can't prevent every attack. Even a perfectly designed system has zero-days, insider threats, and human mistakes. So the second line of defence is detecting attacks quickly, before they become catastrophes. This is called the detect-and-respond paradigm โ€” and for mature security programs it's as important as prevention.

A useful stat: industry surveys consistently find that attackers dwell inside networks for weeks or months before discovery. That's a long window where the attacker is exploring, stealing data, and setting up persistence. Good monitoring shortens that window. In well-run organisations it drops from months to hours.

BRINGING BACK THE FRAMEWORK: Remember the third A of AAA from Chapter 8? Accounting โ€” "what did you do?" Monitoring is how accounting becomes useful. Logs without review are just storage costs. Monitoring turns logs into detection. This is why Chapter 8 warned: "Logs are only useful if someone is looking at them." (In exam terms: monitoring operationalises the Accounting pillar.)

15.2 What Gets Logged

Modern networks produce mountains of log data. Typical sources:

SourceWhat it logsWhat attacks it helps detect
Authentication server (AD, RADIUS, IdP)Logins, failures, password changes, MFA challengesBrute force, credential stuffing, account compromise
FirewallAllowed/blocked connections, source + destination + portPort scanning, unusual outbound connections, C2 traffic
Web serverURLs requested, response codes, user agents, IPsSQL injection attempts, directory traversal, web scraping
Endpoint / EDRProcesses started, files modified, network connections per appMalware execution, lateral movement, ransomware
DNS serverQueries made by each internal deviceMalware C2 domains, DNS tunneling, accessing known-bad domains
Cloud audit logsAPI calls โ€” who created/deleted/modified whatPrivilege escalation, backdoor creation, data exfiltration
Email gatewayMessages sent/received, senders, attachments, SPF/DKIM resultsPhishing, business email compromise, data exfiltration via email

No single log tells the whole story. An attacker's footprint spans multiple systems โ€” they might authenticate to one server, pivot through a firewall, access files on a file server, and exfiltrate data out an email gateway. Catching this requires correlating logs across sources.

15.3 SIEM โ€” The Log Aggregator and Correlator

SIEM (Security Information and Event Management) is the software category that collects logs from every source and correlates them in near-real-time. Examples: Splunk, Microsoft Sentinel, Elastic SIEM, LogRhythm, IBM QRadar.

What a SIEM does:

SIEM โ€” how log sources become actionable alerts Auth server Firewall Web server Endpoints / EDR Cloud audit SIEM collect ยท normalise correlate ยท alert dashboards ยท store ALERTS to security team DASHBOARDS situational awareness REPORTS compliance / audit Central place for humans to see what's happening across the entire network.
Without SIEM, analysts have to log into every system separately and manually spot patterns. With SIEM, patterns surface automatically.

Example correlation rules

The power of SIEM is in combining weak signals into strong ones. Each individual event might be normal; the combination is suspicious.

RuleCatches
10+ failed logins from one IP in 5 minutes, then a successBrute-force or credential-stuffing success
Successful login from a new country within 1 hour of one from home country"Impossible travel" โ€” stolen credentials
User logs in, then admin tools run shortly afterPossible privilege escalation
Large outbound data transfer to an unusual destinationData exfiltration
Internal host making DNS queries to a known C2 domainMalware phoning home
Unusual file access pattern โ€” one user touching hundreds of files in minutesRansomware in progress, or insider data theft

SOAR โ€” the automated response layer

SOAR (Security Orchestration, Automation, and Response) is a newer category that sits on top of SIEM. When an alert fires, SOAR can automatically do things: isolate the device from the network, disable the user account, trigger a password reset, create a ticket. This matters because during a ransomware attack, minutes count โ€” waiting for a human to click "isolate device" may be too slow.

15.4 IDS vs IPS โ€” Watching the Network Itself

Logs come from systems. Another layer watches the network traffic itself, looking for attack patterns in the packets.

 IDS (Intrusion Detection System)IPS (Intrusion Prevention System)
PositionOff to the side, seeing a copy of trafficIn-line โ€” traffic must pass through it
ActionAlerts a human when something looks wrongActively blocks the connection
Risk if wrongNoise (false positives become alerts)Blocking legitimate traffic (false positives disrupt users)
Typical useMonitoring, forensic reconstructionBlocking known attack patterns, automated defence

Modern firewalls often include IPS capability, sometimes called "Next-Gen Firewalls" (NGFW). The firewall already inspects every packet โ€” adding pattern matching is a natural extension.

TRAP: "An IPS will stop everything." No. IPS is good at blocking known bad patterns โ€” signatures of specific exploits. It's much weaker against novel attacks, encrypted traffic it can't inspect, and attacks using legitimate tools (so-called "living off the land"). IPS is part of defence-in-depth, not a silver bullet.

15.5 The Incident Response Cycle

When a breach is detected (or suspected), organisations follow a structured incident response (IR) process. The most common framework is NIST's six-phase cycle.

The Incident Response Cycle (NIST) 1. PREPARE plans, tools, training 2. IDENTIFY detect the breach 3. CONTAIN stop the bleeding 4. ERADICATE remove the threat 5. RECOVER restore operations 6. LESSONS learn and improve โ†’ cycles โ†’
A cycle, not a line. Every incident's lessons feed back into preparation for the next one.

1. Preparation

The work you do before any incident. This includes:

Organisations without an IR plan panic during breaches. Organisations with a tested plan follow it. The difference in damage can be enormous.

2. Identification

Detecting that an incident is happening or has happened. Sources of detection include:

The goal is to confirm the incident is real (not a false positive), classify its severity, and start the response clock. Many "potential incidents" turn out to be benign โ€” part of this phase is triage.

3. Containment

Stopping the incident from getting worse. Two phases are common:

CONTAINMENT TRADE-OFF: Containing too aggressively can alert the attacker (they go quiet and hide; you lose visibility). Too gently and they keep causing damage. In advanced cases, teams may watch the attacker briefly to understand the full scope before containing โ€” but this requires serious skill. For most organisations, immediate containment is the right call.

4. Eradication

Removing the threat entirely. Includes:

This phase requires confidence that you've found everything. Advanced attackers plant multiple backdoors specifically so eradication misses one and they can return. This is why post-incident investigation is so important โ€” you're looking for what else you missed.

5. Recovery

Bringing systems and business operations back to normal. Tasks:

Recovery often takes far longer than containment or eradication. Ransomware victims frequently spend weeks or months rebuilding.

6. Lessons Learned

The most-skipped phase and one of the most valuable. Within a few weeks of the incident, run a post-incident review:

The goal is not to blame, but to improve. Then feed those improvements back into Preparation, closing the cycle.

15.6 Australian Legal Dimension โ€” The NDB Scheme

In Australia, the Notifiable Data Breaches (NDB) scheme under the Privacy Act 1988 requires certain organisations to notify the OAIC (Office of the Australian Information Commissioner) and affected individuals when an "eligible data breach" occurs โ€” generally where there's a likely risk of serious harm to individuals.

This means incident response in Australia is not just a technical exercise. It includes:

This legal obligation is the reason Optus and Medibank notified customers so quickly in 2022 โ€” and why late notification in other breaches has drawn public anger and regulatory action. Chapter 17 covers the legal framework in more depth. (cross-reference: Ch 10 Optus/Medibank cases; Ch 17 Privacy Act + NDB deep dive.)

EXAM-QUALITY PHRASING: "Under the Notifiable Data Breaches scheme (Privacy Act 1988), organisations must notify the OAIC and affected individuals of eligible data breaches โ€” those likely to result in serious harm. Incident response must therefore include a legal assessment pathway alongside the technical response." That's a crisp, Australian-specific sentence worth marks.

15.7 What a Mature Monitoring Setup Looks Like

An exam-grade answer for "describe an effective monitoring and response capability":

EXAM PATTERN โ€” "How does monitoring improve security?":
"Monitoring operationalises the Accounting pillar of AAA โ€” turning logs from passive records into active detections. SIEM correlates events across sources to spot multi-step attacks that individual logs would miss. When combined with a tested incident response plan, it shortens the attacker's dwell time from months to hours, limiting damage even for attacks that prevention missed. This is why mature security follows a 'prevent + detect + respond' model โ€” assuming some breaches will succeed and designing for fast detection and response."

Four distinct points, each grounded: a high-scoring answer.

15.8 Quiz Time

A school collects firewall and authentication logs but no one looks at them until after an incident. What core principle is being violated and what's the fix?
The violation is treating Accounting (AAA's third pillar) as passive storage. Logs without monitoring can't detect anything in real-time. The fix is to (a) centralise logs in a SIEM, (b) set up alerts for suspicious patterns (failed logins + success, impossible travel, large outbound transfers), and (c) have a person or service responsible for reviewing/responding to those alerts 24/7 (or at least during business hours with alerting out-of-hours). Many major breaches were "in the logs" โ€” the gap was nobody watching. (In exam terms: monitoring is the active use of logs; without it, accounting provides only forensics, not defence.)
What's the difference between an IDS and an IPS, and when would you choose each?
IDS (Intrusion Detection System) sits off to the side, receives a copy of traffic, and alerts when it sees suspicious patterns. It can't block. Used in monitoring-heavy environments where false positives must not disrupt users.
IPS (Intrusion Prevention System) sits in-line and actively blocks traffic matching attack signatures. Used where automated blocking is acceptable โ€” typically modern firewalls (NGFWs) include IPS functionality.
Choose IDS when you want visibility without disrupting traffic (e.g., highly-tuned production); choose IPS when you want active defence and accept occasional false-positive blocks (e.g., most perimeter firewalls). In practice, mature organisations use both.
A ransomware attack hits at 2am on a Saturday. Walk through the first four phases of IR that should happen.
1. Identify: SIEM/EDR flags ransomware behaviour (mass file modifications, known ransomware signatures). On-call analyst receives alert, confirms the incident is real. IR plan is activated and incident commander notified.
2. Contain (short-term): Isolate affected hosts from the network immediately (EDR action or network ACL). Disable involved accounts. Block the C2 IPs/domains at the firewall. The goal is to stop lateral spread within minutes.
3. Contain (long-term): Identify the attack's entry vector and close it. Rotate any compromised credentials. Validate that segmentation held.
4. Eradicate: Remove the ransomware and any persistence mechanisms. Rebuild compromised endpoints from clean images rather than "cleaning" them. Verify all backdoors are gone.
(Then recovery and lessons learned.) Meanwhile, legal/compliance is already running a parallel track to assess NDB notification requirements. (In exam terms: a practised response follows a defined playbook, not improvisation.)
Why is the "Lessons Learned" phase often skipped, and why is that a mistake?
It's skipped because by the time the incident is contained and recovered, everyone is exhausted and eager to move on. It's also politically uncomfortable โ€” the review usually identifies things that could have gone better, which can feel like blame. But skipping it means the organisation learns nothing from the experience and remains vulnerable to similar attacks. Mature organisations treat post-incident review as non-optional, frame it as blameless (focus on systems not people), and feed findings back into Preparation for the next cycle. Every serious incident should produce concrete action items โ€” otherwise the organisation pays the cost of the breach without reaping the learning benefit.
โ† Previous
14. Network Defence