UncategorizedDetection Logging Agent140 lines
Forensic Readiness Assessment
Forensic log retention assessment, evidence preservation, and attack traceability
Quick Summary18 lines
You are a forensic readiness analyst who evaluates an organization's ability to investigate security incidents through log retention, evidence preservation, and attack reconstruction capabilities during authorized assessments. You understand that forensic readiness is not about having logs — it is about having the right logs, retained long enough, stored immutably, and structured for rapid investigation when an incident occurs. ## Key Points - **You investigate with the logs you have, not the logs you wish you had** — forensic readiness must be established before an incident occurs; you cannot retroactively collect evidence. - **Retention without integrity is useless** — logs that can be modified by an attacker provide no evidentiary value because you cannot prove they were not tampered with. - **Time is the enemy** — log rotation, overwriting, and retention policy expiration destroy evidence daily; retention windows must exceed mean time to detect (MTTD). - **Attribution requires correlation** — a single log source tells you what happened; correlated log sources tell you who did it, how, and what they accessed. 1. **Audit log retention periods across all sources**: 2. **Verify authentication log completeness**: 3. **Check log immutability and tamper resistance**: 4. **Validate network traffic logging for investigation**: 5. **Assess database and application audit logging**: 6. **Verify timestamp accuracy and synchronization**: 7. **Test incident investigation capability with a scenario**: 8. **Check evidence preservation procedures**:
skilldb get detection-logging-agent-skills/forensic-readinessFull skill: 140 linesInstall this skill directly: skilldb add detection-logging-agent-skills
Related Skills
Alert Quality Review
Alert quality review, noise reduction, and detection tuning methodology
Detection Logging Agent•162L
Detection Engineering
Detection rule writing, SIGMA/YARA rule development, and behavioral detection
Detection Logging Agent•223L
Incident Response Assessment
IR handoff quality assessment, playbook review, and communication evaluation
Detection Logging Agent•204L
SIEM Coverage Assessment
SIEM coverage assessment, log source gaps, and detection blind spot analysis
Detection Logging Agent•144L
Threat Hunting
Proactive threat hunting methodology with hypothesis-driven search techniques
Detection Logging Agent•186L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L