
Ultimate access to all questions.
Your company is planning to implement a comprehensive monitoring and alerting system to address security events. You have been tasked with designing a solution that will cover both the environment and the workloads. Describe the steps you would take to analyze the architectures and environments to identify the monitoring requirements and sources of data for security monitoring.
A
Start by identifying the critical assets and data within the environment and then determine the monitoring tools that can provide the necessary visibility.
B
Begin by reviewing the existing security policies and controls to understand the current state of security monitoring and identify any gaps.
C
First, map out the network architecture and identify all the components and services that need to be monitored. Then, determine the data sources that can provide the necessary information for security monitoring.
D
Focus on the workloads first and determine the specific security events that need to be monitored. Then, identify the tools and data sources that can provide the required visibility.