{"id":56067,"date":"2022-05-30T13:05:07","date_gmt":"2022-05-30T11:05:07","guid":{"rendered":"https:\/\/www.smeup.com\/magazine\/?p=56067"},"modified":"2025-08-05T17:31:25","modified_gmt":"2025-08-05T15:31:25","slug":"monitoraggio-sicurezza-it-correlazione-eventi","status":"publish","type":"post","link":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/","title":{"rendered":"La correlazione tra gli eventi per il monitoraggio della sicurezza IT"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-1\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><strong>Controllare la sicurezza di un sistema significa registrare costantemente quello che avviene e poter distinguere gli episodi anomali dalla normale operativit\u00e0.<\/strong> Spesso ci viene detto: &#8220;tutti gli accessi al sistema vengono registrati&#8221;, ma \u00e8 davvero cos\u00ec utile questo dato se tenuto come informazione isolata? Migliaia di accessi al giorno, riportati su report, a cosa servono nella pratica? Sicuramente a recuperare informazioni storiche nel caso di un danno subito, ma la vera sfida \u00e8 attuare controlli in real time per riuscire a prevenire quel danno. Le raccolte di eventi massivi, senza una qualche forma di correlazione, sono si necessarie, ma hanno una bassa resa in termini di prevenzione sulla sicurezza.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-2\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#f5f4f4;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><h3>Facciamo un esempio esterno al mondo IT:<br \/>\n<strong>la sicurezza di casa nostra<\/strong><\/h3>\n<p>Supponiamo che, per controllare la sicurezza di casa, installiamo delle telecamere per vedere quante persone sostano vicino alla porta d&#8217;ingresso. Alla fine di ogni giornata abbiamo un numero assoluto di persone.<br \/>\n<em>E&#8217; davvero cos\u00ec utile questo dato in una forma cos\u00ec neutra?<br \/>\nNon \u00e8 forse meglio avere informazioni da aggiungere per ottenere qualcosa di pi\u00f9 utile alla sicurezza?<br \/>\nAd esempio: chi sono queste persone?<br \/>\nQuante volte quella persona si ferma davanti alla mia porta nella stessa giornata? In che orari sostano quelle persone?<\/em><\/p>\n<p>Queste e altre ancora sono le informazioni che, correlate tra loro, possono aiutarti ad individuare un reale rischio.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-3\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3 fusion-text-no-margin\" style=\"--awb-margin-bottom:-5%;\"><h2>Gli eventi<\/h2>\n<p>Abbiamo fin qui detto che, per controllare la sicurezza IT, \u00e8 necessario raccogliere costantemente gli eventi che accadono e poi cercare di correlarli tra loro per dargli un valore che consenta di individuare le reali situazioni anomale.<br \/>\n<em>Ma quali possono essere questi eventi da raccogliere?<\/em><\/p>\n<h3>Di seguito un elenco non esaustivo<\/h3>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:2%;--awb-padding-left:3%;--awb-bg-color:#068a9c;--awb-bg-color-hover:#068a9c;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\" style=\"--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><span style=\"color: #ffffff\"><strong>Accessi al sistema<br \/>\n<\/strong>Interattivi, remoti, batch (tramite processi)<\/span><\/p>\n<\/div><\/div><\/div><\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:2%;--awb-padding-left:3%;--awb-bg-color:#068a9c;--awb-bg-color-hover:#068a9c;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\" style=\"--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><span style=\"color: #ffffff\"><strong>Accessi errati al sistema<br \/>\n<\/strong>Password sbagliate, utenti inesistenti, utenti disattivi<\/span><\/p>\n<\/div><\/div><\/div><\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:2%;--awb-padding-left:3%;--awb-bg-color:#068a9c;--awb-bg-color-hover:#068a9c;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\" style=\"--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><span style=\"color: #ffffff\"><strong>Gestione delle utenze<br \/>\n<\/strong>Creazione, modifica di ruolo, cancellazione, disattivazione<\/span><\/p>\n<\/div><\/div><\/div><\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:2%;--awb-padding-left:3%;--awb-bg-color:#068a9c;--awb-bg-color-hover:#068a9c;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\" style=\"--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><span style=\"color: #ffffff\"><strong>Gestione dei file con dati sensibili\/personali<br \/>\n<\/strong>Modifica e cancellazione<\/span><\/p>\n<\/div><\/div><\/div><\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-4 fusion_builder_column_inner_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:2%;--awb-padding-left:3%;--awb-bg-color:#068a9c;--awb-bg-color-hover:#068a9c;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\" style=\"--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><span style=\"color: #ffffff\"><strong>Cambio della data e dell\u2019ora del sistema<\/strong><\/span><br \/>\n<span style=\"color: #ffffff\">Portare indietro la data \u00e8 una delle attivit\u00e0 potenzialmente critiche eseguite da chi vuole commettere atti fraudolenti<\/span><\/p>\n<\/div><\/div><\/div><\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-5 fusion_builder_column_inner_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:2%;--awb-padding-left:3%;--awb-bg-color:#068a9c;--awb-bg-color-hover:#068a9c;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9\" style=\"--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><span style=\"color: #ffffff\"><strong>Comandi eseguiti dagli utenti con diritti elevati<\/strong><\/span><br \/>\n<span style=\"color: #ffffff\">Verifica della tipologia di comandi eseguiti dagli utenti amministratori<\/span><\/p>\n<\/div><\/div><\/div><\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-6 fusion_builder_column_inner_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:2%;--awb-padding-left:3%;--awb-bg-color:#068a9c;--awb-bg-color-hover:#068a9c;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\" style=\"--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><span style=\"color: #ffffff\"><strong>Gestione dei dati di business<br \/>\n<\/strong>Inserimento, cancellazione e modifica dei dati importanti per l\u2019azienda (anagrafiche clienti, gestione del personale, gestione bancaria, giacenze di magazzino\u2026)<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-4\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-11\"><h3>Le propriet\u00e0 degli eventi<\/h3>\n<p>Ogni evento monitorato deve poter essere arricchito di pi\u00f9 informazioni possibili volte al controllo della sicurezza.<br \/>\nAd esempio, non basta infatti sapere che l&#8217;utente &#8220;mrossi&#8221; si \u00e8 collegato al sistema, ma bisogna conoscere altri dati come:<\/p>\n<\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-7 fusion_builder_column_inner_1_5 1_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:20px;--awb-spacing-right-large:9.6%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:9.6%;--awb-width-medium:20%;--awb-order-medium:0;--awb-spacing-right-medium:9.6%;--awb-spacing-left-medium:9.6%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"elegant-image elegant-image-0 elegant-align-center \"><div class=\"elegant-image-wrapper\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27210%27%20height%3D%27210%27%20viewBox%3D%270%200%20210%20210%27%3E%3Crect%20width%3D%27210%27%20height%3D%27210%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/calendar_01.png\" alt=\"\" style=\"width:50px;\"\/><\/div><div class=\"elegant-image-blur-shadow\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27210%27%20height%3D%27210%27%20viewBox%3D%270%200%20210%20210%27%3E%3Crect%20width%3D%27210%27%20height%3D%27210%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/calendar_01.png\" alt=\"\" style=\"width:50px;\"\/><\/div><style type=\"text\/css\"><\/style><\/div><div class=\"fusion-text fusion-text-12\" style=\"--awb-content-alignment:center;\"><p><strong>Quando<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-8 fusion_builder_column_inner_1_5 1_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:20px;--awb-spacing-right-large:9.6%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:9.6%;--awb-width-medium:20%;--awb-order-medium:0;--awb-spacing-right-medium:9.6%;--awb-spacing-left-medium:9.6%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"elegant-image elegant-image-1 elegant-align-center \"><div class=\"elegant-image-wrapper\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27210%27%20height%3D%27210%27%20viewBox%3D%270%200%20210%20210%27%3E%3Crect%20width%3D%27210%27%20height%3D%27210%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/pin-drop_02.png\" alt=\"\" style=\"width:50px;\"\/><\/div><div class=\"elegant-image-blur-shadow\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27210%27%20height%3D%27210%27%20viewBox%3D%270%200%20210%20210%27%3E%3Crect%20width%3D%27210%27%20height%3D%27210%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/pin-drop_02.png\" alt=\"\" style=\"width:50px;\"\/><\/div><style type=\"text\/css\"><\/style><\/div><div class=\"fusion-text fusion-text-13\" style=\"--awb-content-alignment:center;\"><p><strong>Da<\/strong><br \/>\n<strong>dove<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-9 fusion_builder_column_inner_1_5 1_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:20px;--awb-spacing-right-large:9.6%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:9.6%;--awb-width-medium:20%;--awb-order-medium:0;--awb-spacing-right-medium:9.6%;--awb-spacing-left-medium:9.6%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"elegant-image elegant-image-2 elegant-align-center \"><div class=\"elegant-image-wrapper\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27210%27%20height%3D%27210%27%20viewBox%3D%270%200%20210%20210%27%3E%3Crect%20width%3D%27210%27%20height%3D%27210%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/terminal_03.png\" alt=\"\" style=\"width:50px;\"\/><\/div><div class=\"elegant-image-blur-shadow\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27210%27%20height%3D%27210%27%20viewBox%3D%270%200%20210%20210%27%3E%3Crect%20width%3D%27210%27%20height%3D%27210%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/terminal_03.png\" alt=\"\" style=\"width:50px;\"\/><\/div><style type=\"text\/css\"><\/style><\/div><div class=\"fusion-text fusion-text-14\" style=\"--awb-content-alignment:center;\"><p><strong>Con quale programma<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-10 fusion_builder_column_inner_1_5 1_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:20px;--awb-spacing-right-large:9.6%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:9.6%;--awb-width-medium:20%;--awb-order-medium:0;--awb-spacing-right-medium:9.6%;--awb-spacing-left-medium:9.6%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"elegant-image elegant-image-3 elegant-align-center \"><div class=\"elegant-image-wrapper\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27210%27%20height%3D%27210%27%20viewBox%3D%270%200%20210%20210%27%3E%3Crect%20width%3D%27210%27%20height%3D%27210%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/protocollo_04.png\" alt=\"\" style=\"width:50px;\"\/><\/div><div class=\"elegant-image-blur-shadow\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27210%27%20height%3D%27210%27%20viewBox%3D%270%200%20210%20210%27%3E%3Crect%20width%3D%27210%27%20height%3D%27210%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/protocollo_04.png\" alt=\"\" style=\"width:50px;\"\/><\/div><style type=\"text\/css\"><\/style><\/div><div class=\"fusion-text fusion-text-15\" style=\"--awb-content-alignment:center;\"><p><strong>Da quale porta di sistema o con quale protocollo<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-11 fusion_builder_column_inner_1_5 1_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:20px;--awb-spacing-right-large:9.6%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:9.6%;--awb-width-medium:20%;--awb-order-medium:0;--awb-spacing-right-medium:9.6%;--awb-spacing-left-medium:9.6%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"elegant-image elegant-image-4 elegant-align-center \"><div class=\"elegant-image-wrapper\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27210%27%20height%3D%27210%27%20viewBox%3D%270%200%20210%20210%27%3E%3Crect%20width%3D%27210%27%20height%3D%27210%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/Time_05.png\" alt=\"\" style=\"width:50px;\"\/><\/div><div class=\"elegant-image-blur-shadow\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27210%27%20height%3D%27210%27%20viewBox%3D%270%200%20210%20210%27%3E%3Crect%20width%3D%27210%27%20height%3D%27210%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/Time_05.png\" alt=\"\" style=\"width:50px;\"\/><\/div><style type=\"text\/css\"><\/style><\/div><div class=\"fusion-text fusion-text-16\" style=\"--awb-content-alignment:center;\"><p><strong>Per quanto<br \/>\n<\/strong><strong>tempo<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-5\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#f5f4f4;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-17\"><h2>La correlazione tra gli eventi<\/h2>\n<p>Gli eventi descritti finora diventano veramente utili per la sicurezza solo se li leghiamo tra di loro con qualche algoritmo che chiamiamo<strong> correlazione<\/strong>.<\/p>\n<p><strong>Accessi al sistema, la loro provenienza e il software utilizzato<\/strong><\/p>\n<p>Mettendo insieme queste tre informazioni e il tempo in cui avvengono, possiamo creare una semplice correlazione per capire se considerare pericoloso un evento di accesso oppure no. Supponiamo che l&#8217;accesso avvenga da utenti conosciuti, dallo stesso IP, con il software gestionale installato proprio su quell&#8217;IP e in orario d&#8217;ufficio. E&#8217; un&#8217;informazione pericolosa? Dovendo fare una selezione possiamo dare un basso livello di gravit\u00e0 a quel tipo di accesso, mentre alzeremmo il livello se lo stesso accesso avvenisse di notte e magari da un IP diverso da quello atteso.<\/p>\n<p><strong>Gestione degli utenti e accessi<\/strong><\/p>\n<p>Un utente che viene creato, utilizzato e poi eliminato nel giro di pochi minuti, \u00e8 un altro esempio di correlazione tra tre eventi diversi e il periodo temporale. Questa correlazione sicuramente ci allerta su una situazione anomala da verificare il prima possibile.<\/p>\n<p><strong>Accessi errati e loro provenienza<\/strong><\/p>\n<p>Unendo pi\u00f9 eventi diversi e il tempo in cui avvengono, possiamo facilmente individuare eventuali robot che tentano di accedere ai sistemi, magari da un PC ignaro di avere installato quel programma fraudolento. Correlando gli eventi di accesso errato con l&#8217;orario di accesso e l&#8217;IP di provenienza, il gioco \u00e8 fatto: il robot \u00e8 immediatamente individuato. Questa correlazione \u00e8 importante perch\u00e9 gli accessi errati e continui ai sistemi, provocano spesso una disattivazione delle utenze per autoprotezione, con il conseguente fermo di attivit\u00e0.<\/p>\n<p><strong>Utenze amministrative troppo diffuse<\/strong><\/p>\n<p>Potremmo non renderci conto di quanto siano diffuse le password degli utenti amministratori di sistema ma le correlazioni tra gli eventi di sicurezza ci possono aiutare. Infatti, basterebbe verificare, in real time, da quanti IP diversi si stanno collegando tali utenze e il momento in cui lo fanno, per capire se lo stesso profilo \u00e8 utilizzato da pi\u00f9 persone.<\/p>\n<p><span style=\"color: #068a9c\"><strong><em>Tali correlazioni devono essere continuamente attive per poter avere dei riscontri immediati che aiutino a controllare le anomalie nella sicurezza. Per questo motivo non \u00e8 possibile agire manualmente, ma bisogna dotarsi di prodotti o di programmi specifici.<br \/>\n<\/em><\/strong><\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Il monitoraggio della sicurezza IT si basa sulla correlazione degli eventi per identificare anomalie e minacce in tempo reale, rafforzando la capacit\u00e0 di prevenzione e risposta agli incidenti.<\/p>\n","protected":false},"author":6,"featured_media":56077,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7190,7187,7184],"tags":[],"class_list":["post-56067","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sicurezza-informatica","category-tecnologici","category-trend"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Monitoraggio sicurezza IT: l&#039;importanza della correlazione tra eventi<\/title>\n<meta name=\"description\" content=\"Le correlazioni tra eventi devono essere continuamente attive per poter attuare il monitoraggio della sicurezza IT.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Monitoraggio sicurezza IT: l&#039;importanza della correlazione tra eventi\" \/>\n<meta property=\"og:description\" content=\"Le correlazioni tra eventi devono essere continuamente attive per poter attuare il monitoraggio della sicurezza IT.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/\" \/>\n<meta property=\"og:site_name\" content=\"Magazine\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-30T11:05:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-05T15:31:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/monitoring-IT_seo-social_fb-in.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"rachelepelilli\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"rachelepelilli\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/monitoraggio-sicurezza-it-correlazione-eventi\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/monitoraggio-sicurezza-it-correlazione-eventi\\\/\"},\"author\":{\"name\":\"rachelepelilli\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/57bf5562aca9a86b7dec98b38d41750f\"},\"headline\":\"La correlazione tra gli eventi per il monitoraggio della sicurezza IT\",\"datePublished\":\"2022-05-30T11:05:07+00:00\",\"dateModified\":\"2025-08-05T15:31:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/monitoraggio-sicurezza-it-correlazione-eventi\\\/\"},\"wordCount\":8723,\"commentCount\":1,\"image\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/monitoraggio-sicurezza-it-correlazione-eventi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2022\\\/05\\\/monitoraggio-sicurezza-IT.jpg\",\"articleSection\":[\"Sicurezza informatica\",\"Tecnologici\",\"Trend\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/monitoraggio-sicurezza-it-correlazione-eventi\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/monitoraggio-sicurezza-it-correlazione-eventi\\\/\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/monitoraggio-sicurezza-it-correlazione-eventi\\\/\",\"name\":\"Monitoraggio sicurezza IT: l'importanza della correlazione tra eventi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/monitoraggio-sicurezza-it-correlazione-eventi\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/monitoraggio-sicurezza-it-correlazione-eventi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2022\\\/05\\\/monitoraggio-sicurezza-IT.jpg\",\"datePublished\":\"2022-05-30T11:05:07+00:00\",\"dateModified\":\"2025-08-05T15:31:25+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/57bf5562aca9a86b7dec98b38d41750f\"},\"description\":\"Le correlazioni tra eventi devono essere continuamente attive per poter attuare il monitoraggio della sicurezza IT.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/monitoraggio-sicurezza-it-correlazione-eventi\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/monitoraggio-sicurezza-it-correlazione-eventi\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/monitoraggio-sicurezza-it-correlazione-eventi\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2022\\\/05\\\/monitoraggio-sicurezza-IT.jpg\",\"contentUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2022\\\/05\\\/monitoraggio-sicurezza-IT.jpg\",\"width\":1920,\"height\":1282,\"caption\":\"monitoraggio-sicurezza-IT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/monitoraggio-sicurezza-it-correlazione-eventi\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La correlazione tra gli eventi per il monitoraggio della sicurezza IT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\",\"name\":\"Magazine\",\"description\":\"smeup\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/57bf5562aca9a86b7dec98b38d41750f\",\"name\":\"rachelepelilli\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82f5da3e229e5edb6311d91e200ed47628f767263388a800d7a9e9f51ca55b3f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82f5da3e229e5edb6311d91e200ed47628f767263388a800d7a9e9f51ca55b3f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82f5da3e229e5edb6311d91e200ed47628f767263388a800d7a9e9f51ca55b3f?s=96&d=mm&r=g\",\"caption\":\"rachelepelilli\"},\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/author\\\/rachelepelilli\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Monitoraggio sicurezza IT: l'importanza della correlazione tra eventi","description":"Le correlazioni tra eventi devono essere continuamente attive per poter attuare il monitoraggio della sicurezza IT.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/","og_locale":"it_IT","og_type":"article","og_title":"Monitoraggio sicurezza IT: l'importanza della correlazione tra eventi","og_description":"Le correlazioni tra eventi devono essere continuamente attive per poter attuare il monitoraggio della sicurezza IT.","og_url":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/","og_site_name":"Magazine","article_published_time":"2022-05-30T11:05:07+00:00","article_modified_time":"2025-08-05T15:31:25+00:00","og_image":[{"width":2560,"height":1344,"url":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/monitoring-IT_seo-social_fb-in.png","type":"image\/png"}],"author":"rachelepelilli","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"rachelepelilli","Tempo di lettura stimato":"7 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/#article","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/"},"author":{"name":"rachelepelilli","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/57bf5562aca9a86b7dec98b38d41750f"},"headline":"La correlazione tra gli eventi per il monitoraggio della sicurezza IT","datePublished":"2022-05-30T11:05:07+00:00","dateModified":"2025-08-05T15:31:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/"},"wordCount":8723,"commentCount":1,"image":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/monitoraggio-sicurezza-IT.jpg","articleSection":["Sicurezza informatica","Tecnologici","Trend"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/","url":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/","name":"Monitoraggio sicurezza IT: l'importanza della correlazione tra eventi","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/#primaryimage"},"image":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/monitoraggio-sicurezza-IT.jpg","datePublished":"2022-05-30T11:05:07+00:00","dateModified":"2025-08-05T15:31:25+00:00","author":{"@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/57bf5562aca9a86b7dec98b38d41750f"},"description":"Le correlazioni tra eventi devono essere continuamente attive per poter attuare il monitoraggio della sicurezza IT.","breadcrumb":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/#primaryimage","url":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/monitoraggio-sicurezza-IT.jpg","contentUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2022\/05\/monitoraggio-sicurezza-IT.jpg","width":1920,"height":1282,"caption":"monitoraggio-sicurezza-IT"},{"@type":"BreadcrumbList","@id":"https:\/\/www.smeup.com\/magazine\/blog\/monitoraggio-sicurezza-it-correlazione-eventi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.smeup.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"La correlazione tra gli eventi per il monitoraggio della sicurezza IT"}]},{"@type":"WebSite","@id":"https:\/\/www.smeup.com\/magazine\/#website","url":"https:\/\/www.smeup.com\/magazine\/","name":"Magazine","description":"smeup","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.smeup.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/57bf5562aca9a86b7dec98b38d41750f","name":"rachelepelilli","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/82f5da3e229e5edb6311d91e200ed47628f767263388a800d7a9e9f51ca55b3f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82f5da3e229e5edb6311d91e200ed47628f767263388a800d7a9e9f51ca55b3f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82f5da3e229e5edb6311d91e200ed47628f767263388a800d7a9e9f51ca55b3f?s=96&d=mm&r=g","caption":"rachelepelilli"},"url":"https:\/\/www.smeup.com\/magazine\/blog\/author\/rachelepelilli\/"}]}},"_links":{"self":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/56067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/comments?post=56067"}],"version-history":[{"count":25,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/56067\/revisions"}],"predecessor-version":[{"id":58139,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/56067\/revisions\/58139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/media\/56077"}],"wp:attachment":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/media?parent=56067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/categories?post=56067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/tags?post=56067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}