Event JSON
{
"id": "097ee9ac1a908e31f43a534e492222c3e37a12ee287de654f1067af5644c93d3",
"pubkey": "aa1fb93d3b9be190a7970a9dc092de69cc41787910763329098758561bee3102",
"created_at": 1738687805,
"kind": 1,
"tags": [
[
"t",
"infosec"
],
[
"t",
"cybersecurity"
],
[
"t",
"networksecurity"
],
[
"proxy",
"https://infosec.exchange/@screaminggoat/113946644042976036",
"web"
],
[
"t",
"securitybestpractice"
],
[
"proxy",
"https://infosec.exchange/users/screaminggoat/statuses/113946644042976036",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/screaminggoat/statuses/113946644042976036",
"pink.momostr"
],
[
"-"
]
],
"content": "**FBI**: [Guidance on digital forensics and protective monitoring specifications for producers of network devices and appliances](https://www.ic3.gov/CSA/2025/250204.pdf ) (PDF)\nThis guidance outlines expectations for the minimum requirement for forensic visibility, to help network defenders secure organizational networks both before and after a compromise. Network defenders are encouraged to consider these features when selecting new physical and virtual network devices.\n\n#infosec #cybersecurity #networksecurity #securitybestpractice",
"sig": "6b8549f382c6212be966fdcdd650bbfcf235d3a031a9bb3be21fb0bed4b33117fe5df8c8940c25f2ddc8c85340230bb47f4250653b7b2b66dcc5fdd163f9a16e"
}