Information Security Office. Logging Standard



Similar documents
USM IT Security Council Guide for Security Event Logging. Version 1.1

Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Standard: Event Monitoring

FISMA / NIST REVISION 3 COMPLIANCE

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Guideline on Auditing and Log Management

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

The Comprehensive Guide to PCI Security Standards Compliance

CorreLog Alignment to PCI Security Standards Compliance

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Information Security Policy Manual

FINAL May Guideline on Security Systems for Safeguarding Customer Information

HIPAA. considerations with LogMeIn

Audit Logging. Overall Goals

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

HIPAA Security COMPLIANCE Checklist For Employers

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Wellesley College Written Information Security Program

Determine if the expectations/goals/strategies of the firewall have been identified and are sound.

HIPAA Security Alert

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Teleran PCI Customer Case Study

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Autodesk PLM 360 Security Whitepaper

INCIDENT RESPONSE CHECKLIST

IT Security Standard: Computing Devices

Security Standard: Servers, Server-based Applications and Databases

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

White Paper. Support for the HIPAA Security Rule PowerScribe 360

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

How Managed File Transfer Addresses HIPAA Requirements for ephi

STANDARD ON LOGGING AND MONITORING

LogMeIn HIPAA Considerations

GFI White Paper PCI-DSS compliance and GFI Software products

2: Do not use vendor-supplied defaults for system passwords and other security parameters

Quick Setup Guide. 2 System requirements and licensing Kerio Technologies s.r.o. All rights reserved.

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Supplier Information Security Addendum for GE Restricted Data

BKDconnect Security Overview

Basics of Internet Security

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

How To Write A Health Care Security Rule For A University

IT Security Procedure

Compliance Guide: PCI DSS

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

Projectplace: A Secure Project Collaboration Solution

VMware vcloud Air HIPAA Matrix

Best Practices For Department Server and Enterprise System Checklist

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

SANS Top 20 Critical Controls for Effective Cyber Defense

PCI Data Security and Classification Standards Summary

CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS STANDARD 012 IMAGE SECURITY STANDARD

The Protection Mission a constant endeavor

White Paper. BD Assurity Linc Software Security. Overview

How To Achieve Pca Compliance With Redhat Enterprise Linux

FairWarning Mapping to PCI DSS 3.0, Requirement 10

Develop HIPAA-Compliant Mobile Apps with Verivo Akula

Server Security Checklist (2009 Standard)

TSM Studio Server User Guide

LogRhythm and PCI Compliance

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

05.0 Application Development

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

CITY OF BOULDER *** POLICIES AND PROCEDURES

White Paper. PCI Guidance: Microsoft Windows Logging

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

New PCI Standards Enhance Security of Cardholder Data

Web Plus Security Features and Recommendations

MIGRATIONWIZ SECURITY OVERVIEW

Administering Cisco ISE

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Keyfort Cloud Services (KCS)

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

SonicWALL PCI 1.1 Implementation Guide

Transcription:

Information Security Office Logging Standard

Revision History Revision Revised By Summary of Revisions Section(s) / Date Page(s) Revised 6/01/2013 ISO Initial Release All Approvals Review Date Reviewed By Name/Title Action (Reviewed or Approved) 6/01/2013 CISO Jason Pufahl, CISO Approved 6/01/2013 RMAC Risk Management Advisory Council Reviewed 1 P a g e

Table of Contents Revision History... 1 Approvals... 1 Purpose... 3 Underlying Requirements... 3 Activities to be Logged... 3 Elements of the Log... 4 Formatting and Storage... 4 Required Logging Practices... 5 Log Reviews... 6 Log Retention Schedules... 6 References... 7 2 P a g e

Purpose Logging is an essential information security control that is used to identify, respond, and prevent operational problems, security incidents, policy violations, fraudulent activity; assist in business recovery activities; and, in many cases, comply with federal, state, and local laws and regulations. The purpose of the Logging Standard is to define logging expectations and requirements regarding University of Connecticut s (UConn) electronic log data collection and analysis. Underlying Requirements All systems that handle confidential information, accept network connections, or make access control (authentication and authorization) decisions shall record and retain audit-logging information sufficient to answer the following questions: 1. What activity was performed? 2. Who or what performed the activity, including where or on what system the activity was performed from (subject)? 3. What the activity was performed on (object)? 4. When was the activity performed? 5. What tool(s) was the activity performed with? 6. What was the status (such as success vs. failure), outcome, or result of the activity? Activities to be Logged Therefore, logs shall be created whenever any of the following activities are requested to be performed by the system: 1. Create, read, update, or delete confidential information, including confidential authentication information such as passwords; 2. Create, update, or delete information not covered in #1; 3. Initiate a network connection; 4. Accept a network connection; 5. User authentication and authorization for activities covered in #1 or #2 such as user login and logout; 6. Grant, modify, or revoke access rights, including adding a new user or group, changing user privilege levels, changing file permissions, changing database object permissions, changing firewall rules, and user password changes; 7. System, network, or services configuration changes, including installation of software patches and updates, or other installed software changes; 8. Application process startup, shutdown, or restart; 9. Application process abort, failure, or abnormal end, especially due to resource exhaustion or reaching a resource limit or threshold (such as for CPU, memory, network connections, network bandwidth, disk space, or other resources), the failure of network services such as DHCP or DNS, or hardware fault; and 10. Detection of suspicious/malicious activity such as from an Intrusion Detection or Prevention System (IDS/IPS), anti-virus system, or anti-spyware system. 3 P a g e

Logging additional items may be deemed necessary for higher risk or business critical systems at the discretion of the System Administrator and Information Security Office. Elements of the Log Such logs shall identify or contain at least the following elements, directly or indirectly. In this context, the term "indirectly" means unambiguously inferred. 1. Type of action examples include authorize, create, read, update, delete, and accept network connection. 2. Subsystems performing the action examples include process or transaction name, process or transaction identifier. 3. Identifiers (as many as available) for the subject requesting the action examples include user name, computer name, IP address, and MAC address (Note that such identifiers should be standardized in order to facilitate log correlation.) 4. Identifiers (as many as available) for the object the action was performed on examples include file names accessed, unique identifiers of records accessed in a database, query parameters used to determine records accessed in a database, computer name, IP address, and MAC address. (Note that such identifiers should be standardized in order to facilitate log correlation.) 5. Before and after values when action involves updating a data element, if feasible. 6. Date and time the action was performed, including relevant time-zone information if not in Coordinated Universal Time. 7. Whether the action was allowed or denied by access-control mechanisms. 8. Description and/or reason-codes of why the action was denied by the access-control mechanism, if applicable. Formatting and Storage The system shall support the formatting and storage of audit logs in such a way as to ensure the integrity of the logs and to support enterprise-level analysis and reporting. Mechanisms known to support these goals include, but are not limited to, the following: 1. Microsoft Windows Event Logs collected by a centralized log management system; 2. Logs in a well-documented format sent via syslog, syslog-ng, or syslog-reliable network protocols to a centralized log management system; 3. Logs stored in an ANSI-SQL database that itself generates audit logs in compliance with the requirements of this document; and 4. Other open logging mechanisms supporting the above requirements including those based on CheckPoint OpSec, ArcSight CEF, and IDMEF. Whenever possible, the logs should be forwarded to the University Logging Central Repository that is managed by the Information Security Office. 4 P a g e

Required Logging Practices Systems should be time-synchronized via a network time source (preferably time.uconn.edu). If possible, log events should include an indication of time zone. Log data must be transmitted securely via an encrypted mechanism when possible to preserve integrity and confidentiality. This could include encrypting data prior to transmission or providing an encrypted tunneling mechanism. (Compliance can be achieved several ways contact the Information Security Office if you need assistance or to assure you are forwarding your logs to the University Central Log Repository). When possible, audit the access to and modification of log data. All administrator or root access and operations must be logged (including read-only administrator access). Log data should be housed centrally (unless isolation is dictated for compliance reasons), and robust role-based access controls should be utilized for data analysis and retrieval. Alarms raised by University IT resources (e.g., console alerts or messages; system log exceptions; network management alarms; alarms raised by access control systems) must be logged and retained for a specified period. Activation/deactivation of protection systems such as anti-virus, intrusion detection, and file integrity systems must be logged. The following data must never be included in University server log data: Social Security Numbers Clear text authentication credentials (e.g., passwords) PII or financial information (e.g., financial account numbers, credit card numbers, etc.) Timestamps should be recorded in ISO-8601 format, whenever possible: Minimally : 2013-04-03 Acceptable: 2013-04-03 23:45 Ideally: 2013-04-03T23:45Z (in UTC) (This is critical data that assists when investigating the timeline of an incident.) Logging facilities and log information should be protected against tampering, modification, destruction, and unauthorized access. Where possible, system administrators should not have permission to erase, deactivate, or modify logs of their own activities. Minimally, logs are expected to include the details as explained in System and common application logs (https://plone.uconn.edu/workspaces/splunk/system-and-commonapplication-logs) 5 P a g e

Log Reviews Logs should be reviewed at least on a monthly basis. Logs must be reviewed within a 24 hour period in response to suspected or reported security problems on systems containing confidential data or as requested by the Information Security Office. System Stewards are responsible for determining which systems require scheduled log review. Log review shall include investigation of suspicious activity, including escalation to the Information Security Office or the campus incident response process as appropriate. Individuals shall not be assigned to be the sole reviewers of their own activity. Log Retention Schedules The retention schedule applied for log data depends heavily upon the policies, regulations, and/or standards that govern the type of data recorded in log events (and/or the purpose of the systems of origin). At minimum, as a state entity the University is governed by the Connecticut State Library schedules for data retention. In the realm of Information Technology, Schedule S6 "Information Systems Records" guides retention requirements for log data. This policy provides significant latitude for retention, stating that data must be retained "Until no longer administratively valuable." Log data is encompassed by this requirement (see S6-100). Data not governed by any other consideration should be interpreted as subject to Schedule S6 as appropriate, allowing system administrator and/or data steward discretion in selecting a log retention period. However, when data is governed by other regulations/standards, the strictest common denominator for retention requirements should be selected. 6 P a g e

References a. "Information Security Policy Manual" http://policy.uconn.edu/wp-content/uploads/2012/05/information-security-policy- Manual.pdf b. Connecticut State Library Schedule S6 : Information Systems Records, revised 12/2010 http://www.cslib.org/publicrecords/stateretsched/s6infosystms2010.pdf c. CT state HIPAA policies / requirements http://www.ct.gov/best/lib/best/state_hipaa_security_policies_release_2.0_- _Letter_Print.pdf d. SANS Information System Audit Logging Requirements http://www.sans.org/security-resources/policies/audit.php 7 P a g e