Which tools are used to monitor the production environment?
Please describe the process for handling an event or alert.
Are honeypots deployed within your organization for the purpose of identifying attacks?
Please describe the name and model of the honeypot system.
Does your organization perform vulnerability scanning periodically?
Please attach a screen shot showing the last scan and its date.
Is there monitoring for aberations in the availability of applications, networks, and services?
Please attach a screen shot of the system that monitors the avability of systems.
Does your organization have rules built in its SIEM?
Please attach a screen shot showing that rules have been built in the SIEM.