Risky Context
Risky Context
May 18, 2025 at 06:09 PM
Time to share the below article with your SOC vendor and confirm whether, 1. Alerts are configured to detect each type of attack mentioned? 2. ⁠threat hunting happens keeping these attacks as hypothesis?, and 3. ⁠whether outcome of points 1 and 2 above are being reported in periodic status calls? In case of a regulated entity in India (like a bank), outsourcing an activity doesn’t absolve the entity’s responsibility. Regulators expect and check the depth of oversight by entity on their vendor. Good article, worth reading and acting upon. https://vincent03dinh.wordpress.com/2025/04/24/active-directory-detection-engineering-notes/
👍 1

Comments