-
Type of Incidents to be Reported
-
Reconnaissance
- WAF
-
Threat Intelligence
- Multi-domain
-
Firewall
- Network Firewall
- VPC Boundary with Security Groups & NACL
-
Identity & Access Management
- API calls/Audit records
-
Least Privilage
- Policy Analyzer
- Policy Analyzer
Access Advisor
-
Unauthorised Access
- Policy Audit
-
Unauthorised Changes
- GRC
- Guardrails/SCP
-
Vulnerability Exploitation
- EDR
-
Firewall
- Network Firewall
- Web Application Firewall
-
Virus, Malware,Ransomware, Cryptominers
- Threat Intelligence
- EDR/XDR
-
Infrastructure Attack: Servers, Database, Mail Server
- Guardrails/ SCP
- Governance & Compliance
- Audit Trails
-
Spoofing & Phishing Attacks
- EDR
-
Distributed Denial of Service, Bot attacks
- WAF, Shield Advance
-
Web Vulnerabilities - OWASP
- WAF
-
Data Breach & Data Leaks
- DLP, Encryption, Guardrails
-
Attacks on Digital Payment Systems
- Subtopic 1
-
Social Engineering
- Guardrails
- EDR
-
Network Compromise: DNS, Subdomain
- DNSSec
- Network Firewall
-
Cloud Specific: API Vulnerabilities, Weak Cryptography, Exposed data repositories, Cloud credentials
- IAM Roles
- TLS
- Detect-Secretes
- MFA
-
Malicious Mobile Apps/ Websites
- Fraud
- Phising
-
End User account compromise
- User Identity Theft
-
Time Sync
- Changes to Time Configurations
- Follow time sync Standards
-
Incident Reporting
- Unauthorised Access
- Denial of Service/Disruption
- Unauthorised Usage
- Changes in Data without Authorization
-
Logging Requirements
- 180 Days logs
- KYC