Technical Feasibility Assessment

  Use the security requirements and template below to provide management with your own unique feasibility assessment for 3 tools: • Title page (does not count towards the 4-5-page requirement) • 1.0 Purpose – This section must identify each option and the technical feasibility (or likelihood) of each option meeting the SEIM security requirements identified below • 1.1 Option #1: Describe the 1st SEIM tool option and how it aligns with security requirements • 1.2 Option #2: Describe the 2nd SEIM tool option and how it aligns with security requirements • 1.2 Option #3: Describe the 3rd SEIM tool option and how it aligns with security requirements • 1.3 Select the Preferred option from the above 3 SEIM solutions and for the selected option address the following: o Explain the technical feasibility for the selected SEIM solution o Explain how the selected SEIM solution addresses the security requirements o Explain the technical risks in selecting any one of the SEIM solutions • Summary/Conclusion 1. Perform Log Collection 2. Provide Log Management 3. Provide a product that analyzes and correlates network activity 4. Provide a SEIM solution which can generate or be compatible with a ticketing system 5. Provide the ability to meet audit requirements with monitoring and alerting capabilities