CS 392/CS 681 - Computer Security. Module 17 Auditing



Similar documents
What is Auditing? IT 4823 Information Security Administration. Problems. Uses. Logger. Audit System Structure. Logging. Auditing. Auditing November 7

Computer Security. What is Auditing? Policies CIS Prevention Deterrence. Detection. Response Recovery 2. Auditing Chapter 24.

What is Auditing? Auditing. Problems. Uses. Audit System Structure. Logger. Reading: Chapter 24. Logging. Slides by M. Bishop are used.

Design. Syntactic Issues

Computer Security DD2395

USM IT Security Council Guide for Security Event Logging. Version 1.1

CSE/ISE 311: Systems Administra5on Logging

Presented by Henry Ng

Guideline on Auditing and Log Management

syslog - centralized logging

Host Security. Host Security: Pro

Standard: Event Monitoring

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Topics. CIT 470: Advanced Network and System Administration. Logging Policies. System Logs. Throwing Away. How to choose a logging policy?

Audit Logging. Overall Goals

CSE 265: System and Network Administration

Incident Response Plan for PCI-DSS Compliance

Security Correlation Server Quick Installation Guide

Security Best Practice

UNISOL SysAdmin. SysAdmin helps systems administrators manage their UNIX systems and networks more effectively.

Network-Based and Host- Based Intrusion Detection. Harley Kozushko. Graduate Seminar

Passing PCI Compliance How to Address the Application Security Mandates

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Mapping EventTracker Reports and Alerts To FISMA Requirements NIST SP Revision 3 Prism Microsystems, August 2009

Chapter 11 Phase 5: Covering Tracks and Hiding

USFSP Network Security Guidelines

The Institute of Internal Auditors Detroit Chapter Presents

Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Discovering passwords in the memory

How IT Can Aid Sarbanes Oxley Compliance

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

STANDARD ON LOGGING AND MONITORING

The Infrastructure Audit Trail and Part 11

GFI White Paper PCI-DSS compliance and GFI Software products

Security Audit Principles and Practices. Configuring Logging. Overview

Security Correlation Server Quick Installation Guide

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Linux System Administration. System Administration Tasks

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Windows Operating Systems. Basic Security

Development of a System Log Analyzer

Evaluation of different Open Source Identity management Systems

How To Manage Security On A Networked Computer System

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Configuration Information

Chap. 1: Introduction

The Comprehensive Guide to PCI Security Standards Compliance


Integrating LANGuardian with Active Directory

OWASP Logging Project - Roadmap

CorreLog Alignment to PCI Security Standards Compliance

NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO TABLE OF CONTENTS

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

HP LeftHand SAN Solutions

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Intrusion Detection Systems (IDS)

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

Configuration Information

Application Security Policy

Information Security Office. Logging Standard

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Monitoring System Status

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Network and Host-based Vulnerability Assessment

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

FREQUENTLY ASKED QUESTIONS

SonicWALL Global Management System Reporting Guide Standard Edition

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Information Privacy and Security Program Title:

Secret Server Qualys Integration Guide

HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Information Security Basic Concepts

Guidelines for Auditing and Logging

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

Audit Trail Administration

SonicWALL PCI 1.1 Implementation Guide

Penetration Testing Report Client: Business Solutions June 15 th 2015

Basics of Internet Security

2: Do not use vendor-supplied defaults for system passwords and other security parameters

Copyright. Disclaimer. Introduction 1. System Requirements Installing the software 4

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Log Management and Intrusion Detection

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Access Control and Audit Trail Software

Cloud Security:Threats & Mitgations

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing An Update

Transcription:

CS 392/CS 681 - Computer Security Module 17 Auditing

Auditing Audit Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures, and to recommend necessary changes in controls, policies, or procedures. NSTISSI Audit Trail Chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event. Audit trail may apply to information in an IS, to message routing in a communications system, or to the transfer of COMSEC material. NSTISSI 11/13/2003 Lecture 14 - Auditing 2

Auditing Logging Logging is the recording of events or statistics to provide information about system use and performance text book Auditing Auditing is the analysis of the log records to present information about the system in a clear and understandable manner text book 11/13/2003 Lecture 14 - Auditing 3

Auditing mechanisms Uses of auditing mechanisms Logs provide audit trails to events leading to system compromises Helps determine usage patterns of a system Recorded trail of privileged events can thwart privilege misuse and can complement access control Two important questions to address 1. What information to log? 2. What information to audit? 11/13/2003 Lecture 14 - Auditing 4

Anatomy of an auditing system System Events Analyzer Notifier Logger Data Storage Email/Pager/911 System events are generated by applications that use the logging API 11/13/2003 Lecture 14 - Auditing 5

Anatomy of an auditing system Logger: Record information to a data storage Could be in binary or text format Quality and quantity is usually decided by the application and system configuration Analyzer: Analyzes the data logged by the logger Either detects some event or problem or provide feedback on system usage Notifier: Input from the analyzer sent to notifier and it alerts an analyst or system administrator 11/13/2003 Lecture 14 - Auditing 6

Designing an Audit System Implementation Consideration Initial state of the system must be proofed secure How much information and what information to log At which level should we log Syntactic Issues How to express log entries Log entries should be human and machine readable e.g: grammar based entries, XML Avoid ambiguous entries 11/13/2003 Lecture 14 - Auditing 7

Designing an Audit System Log Sanitation Confidentiality policies and privacy laws mandate sanitation of log information Sanitizers can be cryptographic functions, too Sanitizers should maintain integrity of log data Sanitation may be done before after logging If done before information will not leave system boundaries If done after information will not leave policy boundaries Anonymizing sanitizers Deleted information such that both originator and recipient cannot reconstruct the deleted information Pseudonymizing sanitizers Deletes information such that the originator can reconstruct the deleted information 11/13/2003 Lecture 14 - Auditing 8

Designing an Audit System Application and System Logging An audit mechanism should provide applications a set of APIs, formats to perform logging Also, it should provide isolated APIs for the operating system to perform its logging The difference between application and system logs is the level of abstraction they achieve (e.g: many system events lead to an application event) Correlation Problem: Relating system and applications logs. Given a system log and a corresponding application log how can you relate log entries in them. 11/13/2003 Lecture 14 - Auditing 9

Goals of audits Two important security goals Identify any violations of a policy: Audit mechanism attempt to log violations in policy but these violations may not be known Identify particular attempt to breach security: Audit mechanisms attempt to log specific threats to security/policy of a system. Violations are well known 11/13/2003 Lecture 14 - Auditing 10

Auditing procedures Auditing to detect violations of a known policy checks to see if a state of the system violates the policy by which it is bound State-based auditing: State-based auditing mechanisms record a system s state and determine whether a state is secure and complies with the policy Feasible on most distributed systems but infeasible on nondistributed systems Consistent static analysis: if a state is obtained while the system is quiescent then we call the state analysis consistent static analysis Inconsistent static analysis: if a state is obtained while the system is not quiescent then we call the state analysis inconsistent because the state is a set of different states and not one particular state! E.g: file system auditing with TripWire 11/13/2003 Lecture 14 - Auditing 11

Auditing procedures Transition-based auditing Transition-based systems record actions of a system and given a system s state determine whether perform this action violates system security Cannot function alone, requires state information Cannot detect system violations if the system begins in a violated state! E.g: network auditing with TCPWrapper Hybrid auditing mechanisms Combine both state-based and transition-based auditing E.g: Preventing multiple logins 11/13/2003 Lecture 14 - Auditing 12

Auditing procedures Auditing to detect known violations of a policy Used to detect known attacks on a host Mostly static rule-based methods E.g: denial of service attacks, Land Attacks etc. 11/13/2003 Lecture 14 - Auditing 13

Auditing Mechanisms Secure Systems Audit mechanism is integrated with the system Provides added security, integrity to the logs Highly configurable E.g: Secure Syslog, VAX Accounting & Audit Non-Secure Systems Designed with accounting in mind May not be part of the system, but an overlay Weak or no cryptographic support E.g: syslog, BSM in SunOS 11/13/2003 Lecture 14 - Auditing 14

Unix log files Usually in /var/log or /var/adm. Below is a sample lastlog utmp(x) Records each user s last successful login. Displayed at login. Overwritten after every login! Records each user currently logged in wtmp(x) acct Permanent record of user login and logout times. Also shutdowns and startups. Can get very large!! /who, finger, w etc. commands obtain data from utmp and/or wtmp. last command displays in human readable form. Records commands run by every user. Command lastcomm displays in human readable form. Can get HUGE!! Processing needed to summarize and save in savacct. UNIX does not log arguments to commands. Hence vi could actually be cc!!! 11/13/2003 Lecture 14 - Auditing 15

More log files xferlog sulog loginlog messages Application specific logs Logs FTP access Logs use of su command Records bad login attempts Messages printed on system console xferlog (WS FTP), access_log (HTTPD) etc. etc. Note: Log files can be modified by a wily hacker. Still traces can remain. Also, beware false log entries!! Need mechanism for authenticating them in UNIX. Back up your logs!! 11/13/2003 Lecture 14 - Auditing 16

Where and what to log? We mentioned that log files are not secured. So where and how to log? To a printer Logging across the network Logging everything everywhere!! What to log? Everything or as much as you can. What not to log? Anything that may violate privacy. For example, correct passwords, incorrect passwords and also incorrect usernames!! 11/13/2003 Lecture 14 - Auditing 17

Syslog facility General purpose highly configurable logging facility Accepts messages from facilities. Messages have level of importance and syslog.conf file tells syslog how to report message. Facilities mail, lpr, kernel, auth, etc. Levels emerg, err, warning, info, etc. How log file, another host, printer, etc. kern.* /dev/console *.emerg * uucp,news.crit /var/log/spooler None of the log files in Unix systems are secure, including those generated by syslog. Secure syslog is designed to be a secured logging mechanism 11/13/2003 Lecture 14 - Auditing 18

Swatch Monitoring log files can get tedious! Swatch allows you to automatically scan log files for particular entries and take appropriate action like send email. For example /routed.*bind/ echo 24:00:00 0:16 Would cause the following by swatch *The following was seen 20 times in the last 24 hrs * Routed[9293]:bind: Bad file number. Swatch can be used for real time monitoring as well. We can setup swatch to beep a certain number when say, kernel logs a ERROR! This facility is very useful with firewalls and intrusion detection systems 11/13/2003 Lecture 14 - Auditing 19

Additional Audit Utilities Secure Syslog COPS File, directory and device permissions Poor passwords Content, format of password files Contents of /etc/rc* and cron(2), at(2) Integrity of important binaries, text files Chkrootkit Checks to see if there are any rootkits installed 11/13/2003 Lecture 14 - Auditing 20

Additional Audit Utilities Tripwire File adds, deletes, modifications File permissions and properties-ignore, record and check Inode number, number of links User id of owner, group id of owner File type, file size Device number of the disk on which the inode associated with the file is stored Device number of the device to which the inode points. Valid only for device objects. Number of blocks allocated Modification timestamp Inode creation/modification timestamp Growing files-indicates that the file is expected to grow. Shrinking files Access timestamp 11/13/2003 Lecture 14 - Auditing 21

Windows Audit Windows NT has at least three different logs System event log logs system failures, core dumps and other OS related events Application event log Applications can add logs using a log API Security event log records security related events, such as logins, privilege changes etc. Event viewer interprets log formats 11/13/2003 Lecture 14 - Auditing 22

Windows Audit Highly configurable audit mechanism through Active Directory Has nine different categories Audit Account Management Audit logon events Audit object access Audit policy changes Audit privilege use Audit process tracking Audit system events Audit directory services access Audit account logon events 11/13/2003 Lecture 14 - Auditing 23

Audit Browsing 1. Text display of events. Auditor may browse through events after post processing. 2. Hypertext display of events. Associated events are interlinked with each other. Most Unix audit tools use hypertext format 3. Entries are logged to relational databases. Auditor performs queries and/or views of the data. 4. Replay: presents the events in temporal order and highlights temporal relationships 5. Graphing or visual representation of events (WebTrends NT Audit) 6. Slicing: to obtain a minimum set of events that affect a particular object 11/13/2003 Lecture 14 - Auditing 24

Further reading 11/13/2003 Lecture 14 - Auditing 25