SecurityLogMiner / log-collection-client

Everything you do not see but feel the effects of.
Apache License 2.0
0 stars 0 forks source link

Log Transmission Authentication #15

Open khuynh2002 opened 7 months ago

khuynh2002 commented 7 months ago

User story statement:

“As a blue team member, I want to authenticate incoming log data so that I know what source it came from, and whether restriction is required”

Background:

Why do we want it?

To maintain integrity and confidentiality of system.

Who is this for?

Blue team members and admins.

Do we have data to support it?

If data is accepted from a malicious source--speed, integrity and overall security of the system is compromised.

Solution/Requirements:

Design resources (if any)

Dependencies:

List of Tasks

Estimated Timeline

1 week - 3 weeks

Open Questions (if any)

Acceptance Criteria

System must validate authenticity of incoming log data using key pairs/IP restrictions. Naturally, we will want to test the time it takes to authenticate as well and makes sure it is acceptable.

Definition of done

Feature is peer-reviewed, tested, and documentation is updated to explain feature.