IncidentResponsev2

4.66 Validate Critical Security Controls and Monitoring Are Restored and Operational (EDR, SIEM, Cloud Security Tools)

Task

Ensure that all critical security controls (EDR, SIEM, Cloud Security Tools) are restored and operational following eradication and recovery activities.


Conditions

Given access to endpoint agents, SIEM platforms, and cloud-native security services across all environments.


Standards


End State

All critical security controls and monitoring platforms are fully restored, tested, and confirmed operational.


Notes


Manual Steps

Step 1: Validate EDR Agent Coverage and Health

Validate Agent Deployment

Platform EDR Example
Windows/Linux/macOS CrowdStrike, SentinelOne, Defender ATP
CrowdStrike Example
sudo /opt/CrowdStrike/falconctl -g --aid

Look for:

Microsoft Defender ATP

Portal → Device Inventory → Filter → Agent Status → Active/Inactive

Look for:

Operator Note: Contact IT to redeploy agents on missing systems.


Validate Policy Enforcement

Operator Note: Disabled or outdated policies must be corrected immediately.


Step 2: Validate SIEM Log Ingestion

SIEM Method
Splunk Search index=* earliest=-5m
Sentinel Workbook or Log Analytics → Query last 5 min
Elastic Discover → Time range last 5 min

Look for:

Operator Note: Any major log source not appearing → escalate to IT/logging engineer.


Validate Alerting

Example in Splunk:

index=wineventlog EventCode=4625

Operator Note: Coordinate with SOC to validate end-to-end alert pipeline.


Step 3: Validate Cloud Security Tools (AWS, Azure, GCP)

AWS → GuardDuty and Security Hub

aws guardduty get-detector --detector-id DETECTOR_ID

Look for:

Check Console:

Operator Note: If disabled → enable GuardDuty and Security Hub.


Azure → Defender for Cloud

Get-AzSecurityPricing

Look for:

Check Portal:

Operator Note: Ensure Defender for Servers and Defender for Identity are enabled.


GCP → Security Command Center + Cloud Logging

gcloud scc findings list
gcloud logging read "timestamp >= \"2025-05-01T00:00:00Z\""

Look for:

Operator Note: Review SCC → ensure not in “Unconfigured” state.


Step 4: Validate Cross-System Alert and Response Workflow

Operator Note: Validate who gets notified → SOC, IR team, management.


Step 5: Validate and Document


Dependencies


Other Available Tools

Tool Platform Installation Usage
EDR Consoles Cross-platform Native Validate agent status
SIEM (Splunk, Sentinel, Elastic) Cross-platform Native Validate log ingestion
AWS CLI + GuardDuty + Security Hub AWS Package manager Validate cloud security
Azure CLI + Defender for Cloud + Sentinel Azure Package manager Validate cloud security
GCP CLI + Security Command Center GCP Package manager Validate cloud security

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 1.0 Created from scratch with operator-focused validation of EDR, SIEM, and cloud-native security controls Leo