Review historic audit logs to determine if a vulnerability identified in a system has been previously exploited within an time period.
Reviewing historic audit logs to determine if a recently detected vulnerability in a system has been previously exploited by an adversary can provide important information for forensic analyses. Such analyses can help identify, for example, the extent of a previous intrusion, the trade craft employed during the attack, organizational information exfiltrated or modified, mission or business capabilities affected, and the duration of the attack.
historic audit logs are reviewed to determine if a vulnerability identified in a system has been previously exploited within time period.
No cross-framework mappings available