Can security devices (e.g. Snort, Splunk, WAFs, etc.) generate alerts when they aren’t working as designed?

APRA’s CPS 234 regulation section 56 states:

An APRA-regulated entity would typically deploy appropriate
information security technology solutions which maintain the security
of information assets. Examples include firewalls, network acce… Continue reading Can security devices (e.g. Snort, Splunk, WAFs, etc.) generate alerts when they aren’t working as designed?

What is the industry-standard recommendation for where non-functional security requirements end and enterprise requirements begin?

I have been tasked with coming up with security requirements for a project. I am finding it difficult to find the line between where project specific, nonfunctional requirements end and general security requirements for the enterprise begi… Continue reading What is the industry-standard recommendation for where non-functional security requirements end and enterprise requirements begin?