Log Management, Compliance and Auditing



Similar documents
Guideline on Auditing and Log Management

Assuria from ZeroDayLab

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

QRadar SIEM 6.3 Datasheet

OWASP Logging Project - Roadmap

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

TRIPWIRE NERC SOLUTION SUITE

SANS Top 20 Critical Controls for Effective Cyber Defense

ALERT LOGIC FOR HIPAA COMPLIANCE

Information Technology Policy

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Security Coordination with IF-MAP

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

HP NonStop Server Security and HP ArcSight SIEM

Intelligence Driven Security

Logging In: Auditing Cybersecurity in an Unsecure World

2012 Data Breach Investigations Report

Continuous Network Monitoring

Clavister InSight TM. Protecting Values

Security Information Lifecycle

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Defending against Cyber Attacks

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Five Ways to Use Security Intelligence to Pass Your HIPAA Audit

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

IBM QRadar Security Intelligence April 2013

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Bellevue University Cybersecurity Programs & Courses

STANDARD ON LOGGING AND MONITORING

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Scalability in Log Management

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Using SIEM for Real- Time Threat Detection

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

USM IT Security Council Guide for Security Event Logging. Version 1.1

INCIDENT RESPONSE CHECKLIST

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

How To Manage Security On A Networked Computer System

Fostering Incident Response and Digital Forensics Research

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Personal Security Practices of the CAO

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Analyzing Logs For Security Information Event Management Whitepaper

Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success

Software that provides secure access to technology, everywhere.

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Caretower s SIEM Managed Security Services

Boosting enterprise security with integrated log management

BeyondInsight Version 5.6 New and Updated Features

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Security Information & Event Management (SIEM)

Tivoli Security Information and Event Manager V1.0

Cisco Advanced Services for Network Security

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Security Controls What Works. Southside Virginia Community College: Security Awareness

Working with the FBI

High End Information Security Services

The Top Ten Insider Threats and How to Prevent Them

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Discover Security That s Highly Intelligent.

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

LogRhythm and NERC CIP Compliance

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Operationalizing Information Security: Top 10 SIEM Implementer s Checklist

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Attachment A. Identification of Risks/Cybersecurity Governance

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

Critical Security Controls

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

Professional Services Overview

The Protection Mission a constant endeavor

The Education Fellowship Finance Centralisation IT Security Strategy

The Role of Security Monitoring & SIEM in Risk Management

FISMA / NIST REVISION 3 COMPLIANCE

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Payment Card Industry Data Security Standard

Reliable, Repeatable, Measurable, Affordable

RETHINK SECURITY FOR UNKNOWN ATTACKS

Find the Who, What, Where and When of Your Active Directory

Transcription:

Log Management, Compliance and Auditing KR Information Security Solutions www.kriss.in 1

About KRISS Founded early 2008, by former Indian Naval Officers and Veterans with decades of experience in Information Security, Information Warfare & Network Security. An ISO/IEC 27001:2005 certified and CERT-In empanelled IT Security Auditing Organisation. Highly motivated & experienced management and consulting team with an impressive record of providing security services to major brands across globe including FMCG, Fortune 500, CMM Level 5 companies to name a few. 2

Agenda Current Cybercrime Scenario Introduction to Logs Benefits of Logging and Challenges Log Management Architecture Policies, Roles, Operational Process, Security Issues, Log Analysis and Long Term Storage Regulations, Mandates and Controls Real-Time Collection and Consolidation of Logs Log Monitoring, Review, Compliance and Auditing Typical Organisation Logging Scenario and Problems Faced SIEM Benefits and Features Types of Logging Tools 3

Current Cybercrime Scenario 4

The 21 st Century the age of cybercrime Year 2010 was the year of cybercrime and cyberwars. Year of Wikileaks The New York Times, Guardian, Der Spiegel, El Pais, Le Monde, CNN, BBC and more. 2010, 2011.. FBI warns Congress that cybercriminals can hack any internet-linked system Gordon M. Snow Assistant director of the FBI s Cyber Division (13th of April, 2011) 5

Every technology is vulnerable 6

New threats targeted, professional, silent There are Internet shops full of credit card, bank account, privacy, business and other confidential data. Also there are available services to rent a botnet, malicious code and attack anyone. Black Community where cybercriminals are organized better than hi level military organizations Video trainings and elearning available in social media, such as YouTube 7

New threats targeted, professional, silent

Logs are like fingerprints 9

Introduction to Logs 10

What is Log? Log is a record of the events occurring within and organisation s systems and networks, used to provide data useful for troubleshooting problems, optimising performance, maintaining security compliance and investigating malicious activities. Examples: Security Software Log Operating System Log Application Log 11

Common Types of Logs Operating System Log System events (startup, shutdown, failure, success, error). Audit records (successful and failed authentication attempts, file accesses, security policy changes, account changes, and use of privileges). Application Log Events logged by the applications. Some applications generate their own log files, while others use the logging capabilities of the OS. 12

Common Types of Logs Security Software Log Log generated by network-based and host-based security software to detect malicious activity, protect systems and data, and support incident response efforts. 13

Standard log formats Syslog SNMP XML CSV Binary Human Readable Text Files There is no consensus in the security community as to the standard terms to be used to describe the composition of log entries and files. Binary files often use proprietary formats that are software-specific (e.g., event logs on Windows systems). 14

Preparedness is the Best Defense Unfortunately, that [no log data being available] happens more often than I would like If your home had been robbed, you would have to tell the police officer what was stolen and how the burglar got in. The same is also true for the network. If you simply tell us you have been broken into, and have no evidence to support it, we may be empathetic, but we can t open a case Shelagh Sayers Special Agent, FBI, San Francisco 15

Where to start from? Most organizations need a central solution for gathering logs and correlating them for real time intelligent visibility. Appropriate strategic policy changes need to be made for shifting organisation s focus on monitoring business processes instead of network. Organisations need to monitor identities, applications, information and their context instead of just IP addresses, OS s and devices. If you are not already doing this You are vulnerable!!! 16

Logs = Activity Tracking 17

Logs = Accountability 18

Log Data Overview What Logs? From Where? Audit Logs Transaction Logs Intrusion Logs Connection Logs System Performance Records User Activity Logs Firewalls/IPS/IDS Routers/Switches Servers/Desktops Applications Databases Anti-virus VPNs 19

Log Management Process Log Management comprises an approach to dealing with large volumes of log messages and covers log collection, centralized aggregation, long-term retention, log analysis as well as log co-relation, searching and reporting. 20

Benefits of Logging and Challenges 21

Benefits Identification of security incidents and incident response Identification of policy violations and fraudulent activities Threat protection and discovery Forensics, e-discovery and litigation support Regulatory compliance Internal policies and procedure compliance Internal and external audit support IT system and network troubleshooting IT performance management 22

Challenges Several potential problems with the initial log generation because of their variety and prevalence. Multiple log sources Inconsistent log content (i.e Protocol name variations (80, HTTP, WWW), Date format variations (MM-DD-YY or MMDDYY)) Inconsistent time-stamps Inconsistent log formats (i.e Human readable, XML, Binary etc.) The Confidentiality, Integrity and Availability of generated logs could be breached inadvertently or intentionally. People responsible for performing analysis are often inadequately prepared and supported. 23

Meeting Challenges Prioritize log management appropriately throughout the organization Establish policies and procedures for log management Create and maintain a secure log management infrastructure Provide proper training for all staff with log management responsibilities 24

Log Management Architecture 25

Log Management Architecture Three Tiers of Log Management Log Generation Hosts that generate log data. Log Analysis and Storage One or more log servers which receive log data from the hosts. Log Monitoring Consoles that may be used to monitor and review log data and the results of automated analysis. 26

Log Management Architecture 27

Stages and Functions General Log Parsing Event Filtering Event Aggregation Storage Log Rotation Log Archival Log Compression Log Reduction Log Conversion Log Normalization Integrity Checking Analysis Correlation Viewing Reporting Disposal Log Clearing 28

Types of Tools Used Syslog based tools SNMP based tools SIEM / SIM / SEM 29

Tea Break 30

Policies, Roles, Operational Process, Security Issues, Log Analysis and Log Term Storage 31

Things to Consider: Policies Things to consider: Log Generation: Hosts, services, type of data and frequency. Log Transmission: How the log data should be transferred, how frequently and measures to protect CIA of log data during transit. Log Storage and Disposal: Log rotation, CIA protection, duration, resource allocation and log disposal. Log Analysis: Frequency, roles, access details, incident identification and response and handling information disclosure through logs. 32

Policy Example Source: NIST 800-92 33

Things to Consider: Roles System and Network Admin Security Admin Incident Response Team Application Developers CSO CIO Auditors 34