Monitor

Overview

To remain reliable and operational, an information system must be under constant monitoring and continuous evolution from the moment it goes into production. It must therefore integrate all the necessary tools for its operation, meaning those that ensure its optimal configuration, administration, monitoring, updating, service continuity (including backup and restoration), and change management.
Likewise, in the event of an incident (which should always be anticipated), all procedures to follow must be planned in advance and implemented to minimize the impacts and consequences of the incident, notably through business continuity or disaster recovery plans.

Scenario

Example scenarios:

  • Monitoring and analysis of the information system
  • Security audit
  • Managing a security incident

Key Components

  • CE5.01 | by ensuring continuous monitoring
  • CE5.02 | by performing critical updates
  • CE5.03 | by automating tasks
  • CE5.04 | by integrating into a team
  • CE5.05 | by monitoring network behavior
  • CE5.06 | by ensuring compliance with contracts and obligations of the information system

Critical Learning

  • AC25.01Cyber | Administer protections against malware
  • AC25.02Cyber | Use network/system penetration testing tools

Related Projects

Here are the SAE projects that required the skill of administering networks and the internet:

  • SAE 1.02: Introduction to computer networks
  • SAE 1.05: Data processing