Log Management for the University of California: Issues and Recommendations



Similar documents
Level 3 Public Use. Information Technology. Log/Event Management Guidelines

Network Security Policy

Guideline on Auditing and Log Management

Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Network Security Policy

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

Retention & Destruction

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Sygate Secure Enterprise and Alcatel

Network Security Policy: Best Practices White Paper

Standard: Event Monitoring

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Information Technology Cyber Security Policy

CMPT 471 Networking II

CTS2134 Introduction to Networking. Module Network Security

The University of Information Technology Management System

Policy on Connection to the University Network

How To Protect A Network From Attack From A Hacker (Hbss)

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

USM IT Security Council Guide for Security Event Logging. Version 1.1

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Payment Card Industry (PCI) Data Security Standard

Multi-Homing Dual WAN Firewall Router

Section 12 MUST BE COMPLETED BY: 4/22

IT Security Standard: Network Device Configuration and Management

White Paper. BD Assurity Linc Software Security. Overview

SonicWALL PCI 1.1 Implementation Guide

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

APPENDIX 8 TO SCHEDULE 3.3

Ranch Networks for Hosted Data Centers

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Network and Security Controls

GFI White Paper PCI-DSS compliance and GFI Software products

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Network Configuration Settings

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Fundamentals of Network Security - Theory and Practice-

Microsoft Technologies

APPENDIX 8 TO SCHEDULE 3.3

SANS Top 20 Critical Controls for Effective Cyber Defense

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

User Manual. Page 2 of 38

Setting Up Scan to SMB on TaskALFA series MFP s.

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

IT Networking and Security

Concierge SIEM Reporting Overview

EA-ISP-012-Network Management Policy

Chapter 1 The Principles of Auditing 1

Security Controls in Service Management

How To Manage Security On A Networked Computer System

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Small Business Server Part 2

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.

PCI Security Scan Procedures. Version 1.0 December 2004

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

74% 96 Action Items. Compliance

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Basics of Internet Security

Jumpstarting Your Security Awareness Program

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

NETWORK SETUP GLOSSARY

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Savvius Insight Initial Configuration

Chapter 9 Firewalls and Intrusion Prevention Systems

The Trivial Cisco IP Phones Compromise

HIPAA Security Alert

A typical router setup between WebSAMS and ITEd network is shown below for reference. DSU. Router

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

Application Note Secure Enterprise Guest Access August 2004

Lab Configuring Access Policies and DMZ Settings

Avaya TM G700 Media Gateway Security. White Paper

Injazat s Managed Services Portfolio

Firewalls CSCI 454/554

Avaya G700 Media Gateway Security - Issue 1.0

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Supplier IT Security Guide

Global Partner Management Notice

Network Monitoring and Security Measures in Campus Networks

Information Technology Security Guideline. Network Security Zoning

Locking down a Hitachi ID Suite server

PCI DSS Requirements - Security Controls and Processes

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Transcription:

Log Management for the University of California: Issues and Recommendations Table of Contents 1 Introduction...2 2 Candidate Sources of Logged Information...3 3 Recommended Log Management Practices...4 3.1 Log Generation...4 3.1.1 Application Logs...4 3.1.2 System Logs...4 3.1.3 Network Logs...5 3.1.4 Time Synchronization...6 3.2 Use of Log Information...6 3.2.1 Baseline Behavior...6 3.2.2 Investigation...6 4 Appropriate Use of Log Information...7 5 Log Record Life-Cycle Management...7 5.1 Retention...7 5.2 Log Management Infrastructure...8 6 Summary of Recommendations...9 7 Acknowledgments...11 LogManagementGuidelines-2006-05-01.odt Page 1

1 Introduction Most components of an information technology infrastructure are capable of producing logs chronicling their activity over time. These logs often contain very detailed information about the activities of applications and the layers of software and hardware that support those applications. Examples include: Application logs can identify what transactions have been performed, at what time, and for whom. Those logs may also describe the hardware and operating system resources that were used to execute that transaction. Network devices, such as firewalls, intrusion detection/prevention systems, routers, and switches are generally capable of logging information. These logs have value of their own to network administrators, but they also may be used to enhance the information in application and other logs. With proper management, these logs can be of great benefit in a variety of scenarios, to enhance security, system performance and resource management, and regulatory compliance. In particular, a log management infrastructure can capture information and aid analysis about the following: Access. Who is using services. Change Monitoring. How and when services are modified. Cost Allocation. When applicable, who should pay how much for services. Malfunction. When services fail. Resource Utilization. How much capacity is used by services. Security Events. What activity occurred during an incident, and when. User Activity. What people are doing with services. The following are example scenarios illustrating how the information in logs can be critical to resolving a security or operational issue: Internet access is very slow for 10-20 minute periods at random times throughout the day. Router logs identify a high rate of transmission errors on the campus s Internet connection at those times. The network administrator calls the campus s ISP to repair the connection. Internet access is very slow, but everything seems to be working correctly. Firewall and router logs determine that a particular PC in the dorms is under attack from over 500 addresses located around the world, most likely a botnet. This allows the network administrator to have that PC s Internet traffic blocked, relieving the campus s networkwide congestion. LogManagementGuidelines-2006-05-01.odt Page 2

A student has been dropped from all of her classes and accuses the Registrar and threatens to sue. An application log shows that her user ID had been used to drop the classes two hours after she had dropped her boyfriend, and that the session originated from her boyfriend s dorm room. She remembers that she had given her password to her ex. A server containing sensitive information (Social Security numbers) was compromised by hackers who installed an FTP service and pornographic images. To determine who, how and extent of the compromise the logs from the server operating system, the FTP software, firewall and IDS system are all analyzed as part of the investigation. The University must manage these logs in a manner that facilitates these benefits while protecting the privacy and integrity of the information contained in these logs. This document recommends appropriate practices for log management within a campus s overall IT infrastructure. 2 Candidate Sources of Logged Information There are many sources of log information: Application logs have the potential to identify what transactions have been performed, at what time, by whom, and on what object. Those logs may also describe the client and server hardware and operating system resources that were used to execute that transaction. System logs for operating systems and services, such as web, database, authentication, print, etc. provide detailed information about their activity and are an integral part of system administration. When related to application logs, they provide an additional layer of detail that is not observable from the application itself. Service logs can also aid in intrusion analysis, when an intrusion bypasses the application itself. Network devices, such as firewalls, intrusion detection/prevention systems, routers, and switches are generally capable of logging information. As before, these logs add purpose of their own to network administrators, but they also can enhance the information in operating system, service, and application logs. Change management logs that document changes in the IT or business environment provide context for the automatically-generated logs described above. Other sources, such as physical access or surveillance logs can provide context when investigating security incidents. These logs have the potential of being very large, depending on the volume of activity and the amount of information in each log entry. The cost of storage and processing should be considered when determining which sources should be incorporated into the log management infrastructure, as well as the potential benefit of having that information at some time in the future. LogManagementGuidelines-2006-05-01.odt Page 3

3 Recommended Log Management Practices 3.1 Log Generation This section describes information that might be included in various types of logs. It should be noted, however, that the information in logs often cannot be controlled by application, system, or network administrators, so the items listed here, while often highly desirable, should not be viewed as absolute requirements. 3.1.1 Application Logs Applications should log their activity in a manner that correlates well with the business processes the applications support, particularly any operations that modify permissions or access rights. These logs should include: The business operation that was requested Whether the request was accepted or denied The time and date the operation was performed (Start and end times may be appropriate for long operations.) Who initiated the operation System and network resources used Any information needed for business process controls Client hardware and software characteristics It should be noted that the application may actually be a more generic service, such as a web, file, or print server, or even a PBX. In this case, it may be difficult to relate the more generic logs to business processes. When this is the case, appropriate documentation may need to be maintained describing the relationship between the logs and the supported business processes. 3.1.2 System Logs Many components of the IT infrastructure generate logs. Examples of these components include: Operating Systems Web servers Database servers Print servers File servers Authentication servers DHCP servers DNS servers Electronic mail server logs LogManagementGuidelines-2006-05-01.odt Page 4

In general, all of these logs have potential value and should be maintained. These logs should include the following types of information: The server operation that was requested Whether the request was accepted or denied The time and date the operation was performed (Start and end times, or duration, may be appropriate for long operations.) Who and/or what system initiated the operation System and network resources used Host-based firewalls also generate valuable log information. This is described in the Network Logs section of this document. It should be noted that client workstations also generate system logs that are of interest, particularly for local authentication, malware detection, and host-based firewalls. 3.1.3 Network Logs Many components of the network infrastructure generate logs. Examples of these components include: Routers Switches Wireless access points Network-based firewalls Host-based firewalls Intrusion detection and prevention systems Telephone Switches These logs typically describe flows of information through the network, but not the individual packets contained in that flow. (A flow is the traffic that corresponds to a logical connection between two processes in the network. Examples of flows include a connection to a web server, a remote login session, or a Domain Name System lookup.) Information logged for a flow should include: Network (IP) addresses or telephone numbers of the end points Service identifiers (port numbers) for each of the end points Whether the flow was accepted or denied Date, time, and duration of the flow Number of packets and bytes used by the flow LogManagementGuidelines-2006-05-01.odt Page 5

Other components of the network infrastructure, such as DHCP and DNS servers, provide valuable information about network configuration elements, such as IP addresses, that change over time. The logging requirements for these servers are covered in the System Logs section of this document. 3.1.4 Time Synchronization One of the important functions of a log management infrastructure is to relate records from various sources by time. Because of this, it is important that all components of the IT infrastructure have synchronized clocks. Use of a time service, such as NTP, is highly recommended. 3.2 Use of Log Information 3.2.1 Baseline Behavior It is essential that a baseline of activity within the IT infrastructure be established and tracked as it changes over time. For system and network administrators, this should include the volume of activity for major applications and systems, as well as traffic volume over the network, and should be presented over a common time scale. It may also be desirable to present application activity to business managers in a manner that enables them to correlate the information with business volume. Understanding baseline behavior allows for the detection of anomalous behavior, which could indicate a security incident or a change in normal usage patterns. Procedures should be in place to ensure that this information is reviewed on a regular and timely basis. 3.2.2 Investigation When an incident occurs, various ad hoc questions will need to be answered. These incidents may be security related, or they may be due to a malfunction, a change in the IT infrastructure, or a change in usage patterns. Whatever the cause of the incident, though, it will be necessary to retrieve and report log records based on a variety of selection criteria, such as: Source(s) of the log records Time Network address Application or service User LogManagementGuidelines-2006-05-01.odt Page 6

When matching records from multiple sources, time and network address will be the most valuable for matching records. Application, service, and user may also be desired for matching, but it is likely that they will need to be associated with network address and time in order to accomplish this. 4 Appropriate Use of Log Information Logs often contain information that, if misused, could represent an invasion of the privacy of members of the UC community. While it is necessary for the University to perform regular collection and monitoring of these logs, this activity should be consistent with the provision of least perusal described in UC s Electronic Communication Policy. 5 Log Record Life-Cycle Management When logs document or contain valuable information related to activities of the University s information resources or the people who manage those resources, they are University Administrative Records, subject to the requirements of the University Records Management Program to ensure that they are...appropriately managed and preserved, and can be retrieved as needed. See the University Business and Finance Bulletins Records Management and Privacy Series for more information, particularly: RMP-2, Records Retention and Disposition (http://www.ucop.edu/ucophome/policies/bfb/rmp2.pdf), and RMP-8, Legal Requirements on Privacy of and Access to Information (http://www.ucop.edu/ucophome/policies/bfb/rmp8toc.html). The following are specific issues that should be considered with respect to such log records. 5.1 Retention In order to facilitate investigation as well as to protect privacy, the retention of log records should be well-defined to provide an appropriate balance among the following: confidentiality of specific individuals activities, the need to support investigations, and the cost of retaining the records The records required to support investigation often contain information about specific individuals activities and must, therefore, be protected adequately against unauthorized disclosure. It is also the case that records required for long-term analysis often contain information about specific individuals activities, but that specific information is not needed. When the retention period required for analysis is significantly longer than that for investigation, new records can be created by aggregating or redacting the original records to reduce the cost of managing the records and protecting them against unauthorized disclosure. LogManagementGuidelines-2006-05-01.odt Page 7

Care should be taken not to retain log records that are not needed. The cost of long-term retention can be significant, and could expose the University to high costs of retrieving and reviewing the otherwise unneeded records in the event of litigation. 5.2 Log Management Infrastructure As a best practice, a log management infrastructure should be established to provide common management of log records. This infrastructure will: move log records into the infrastructure, provide secure storage for the records, implement record retention policies, facilitate access to log records, provide analysis tools that enable correlations among records from multiple sources, and protect the chain of evidence for the possibility that log records are used in legal proceedings. The following diagram illustrates such an infrastructure. System Administrator Web Server Access Log Error Log Computing Server Access (login) Log System Log Application Application Server JVM Log Process Log Application Log Management Service (Repository, Tools) Other Computing Device Database Server Transaction Log Error Log Firewall Network Hub Other Network Device Desktop Computer Access (login) Log System Log Router Network Administrator LogManagementGuidelines-2006-05-01.odt Page 8

In order to facilitate the creation of campus-based log management infrastructures, it is recommended that system-wide groups be established to address the following issues: Technology solutions that can be used to build log management infrastructures. Typical retention periods for common examples of logged information. 6 Summary of Recommendations Introduction Section Candidate Sources of Logged Information Application Logs System Logs Recommendations The University should manage logs in a manner that facilitates the benefits described in this document, while protecting the privacy and integrity of the information contained in these logs. The cost of storage, processing, management, etc., as well as the benefit benefit, should be considered when selecting sources for incorporation into the log management infrastructure. Applications should log their activity in a manner that correlates well with the business processes the applications support, particularly any operations that modify permissions or access rights. These logs should include, at a minimum: The business operation that was requested Whether the request was accepted or denied The time and date the operation was performed (Start and end times may be appropriate for long operations.) Who initiated the operation System and network resources used Any information needed for business process controls Client hardware and software characteristics System logs should include the following types of information: The server operation that was requested Whether the request was accepted or denied The time and date the operation was performed (Start and end times, or duration, may be appropriate for long operations.) Who and/or what system initiated the operation System and network resources used LogManagementGuidelines-2006-05-01.odt Page 9

Section Network Logs Time Synchronization Baseline Behavior Investigation Recommendations Information logged for a network flow should include: Network (IP) addresses of the end points Service identifiers (port numbers) for each of the end points Whether the flow was accepted or denied Date, time, and duration of the flow Number of packets and bytes used by the flow One of the important functions of a log management infrastructure is to relate records from various sources by time. Because of this, it is important that all components of the IT infrastructure have synchronized clocks. Use of a time service, such as NTP, is highly recommended. The baseline of activity within the IT infrastructure should be established and tracked as it changes over time. For system and network administrators, this should include the volume of activity for major applications and systems, as well as traffic volume over the network, and should be presented over a common time scale. It may also be desirable to present application activity to business managers in a manner that enables them to correlate the information with business volume. Procedures should be in place to ensure that this information is reviewed on a regular and timely basis. When conducting an investigation, it will be necessary to retrieve and report log records based on a variety of selection criteria. Preparations should be made to perform ad hoc queries based on criteria, such as the following: Source(s) of the log records Time Network address Application or service User When matching records from multiple sources, time and network address will be the most valuable for matching records. Application, service, and user may also be desired for matching, but it is likely that they will need to be associated with network address and time in order to accomplish this. LogManagementGuidelines-2006-05-01.odt Page 10

Section Appropriate Use of Log Information Retention Log Management Infrastructure Recommendations While it is necessary for the University to perform regular collection and monitoring of these logs, this activity should be consistent with the provision of least perusal described in UC s Electronic Communication Policy. In order to facilitate investigation as well as to protect privacy, the retention of log records should be well-defined to provide an appropriate balance among the following confidentiality of specific individuals activities, the need to support investigations, and the cost of retaining the records Each campus should establish a log management infrastructure to do the following: move log records into the infrastructure, provide secure storage for the records, implement record retention policies, provide analysis tools that enable correlations among records from multiple sources, and protect the chain of evidence for the possibility that log records are used in legal proceedings. System-wide groups should be established to address the following issues: Technology solutions that can be used to build log management infrastructures. Typical retention periods for common examples of logged information. 7 Acknowledgments This document is the result of work done by a subgroup of the University of California Information Technology Policy and Security Officers. The work group members were: Jacqueline Craig, UC Office of the President Jon Good, UC Office of the President Karl Heins, UC Office of the President Binh Nguyen, UC San Francisco Medical Center Carl Tianen, UC San Francisco David Walker, UC Office of the President LogManagementGuidelines-2006-05-01.odt Page 11