Audit Logging. Overall Goals



Similar documents
Teleran PCI Customer Case Study

FairWarning Mapping to PCI DSS 3.0, Requirement 10

The Comprehensive Guide to PCI Security Standards Compliance

CorreLog Alignment to PCI Security Standards Compliance

March

IDAM in the Cloud. March 11, 2015; Gunnar Peterson

2: Do not use vendor-supplied defaults for system passwords and other security parameters

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

LogRhythm and PCI Compliance

SonicWALL PCI 1.1 Implementation Guide

GFI White Paper PCI-DSS compliance and GFI Software products

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents

74% 96 Action Items. Compliance

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

An Oracle White Paper January Using Oracle Enterprise Manager Configuration Management Pack for PCI Compliance

General Standards for Payment Card Environments at Miami University

Achieving PCI-Compliance through Cyberoam

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment.

Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond

PCI and PA DSS Compliance Assurance with LogRhythm

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Information Security Office. Logging Standard

Passing PCI Compliance How to Address the Application Security Mandates

Security for PCI Compliance Addressing Security and Auditing Requirements for In-scope Web Applications, Databases and File Servers

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Achieving PCI DSS Compliance with Cinxi

PCI DSS Requirements - Security Controls and Processes

Event Log Monitoring and the PCI DSS

Meeting PCI-DSS v1.2.1 Compliance Requirements. By Compliance Research Group

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Payment Card Industry Data Security Standard

Observations from the Trenches

American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Standard: Event Monitoring

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Data Management Policies. Sage ERP Online

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

FISMA NIST (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards

Windows Azure Customer PCI Guide

Software Requirements Specification. Schlumberger Scheduling Assistant. for. Version 0.2. Prepared by Design Team A. Rice University COMP410/539

PCI Wireless Compliance with AirTight WIPS

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

REGULATIONS COMPLIANCE ASSESSMENT

05.0 Application Development

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

Configuration Information

PCI Requirements Coverage Summary Table

INFORMATION TECHNOLOGY CONTROLS

Autodesk PLM 360 Security Whitepaper

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

John Essner, CISO Office of Information Technology State of New Jersey

Workflow Templates Library

Security Policy JUNE 1, SalesNOW. Security Policy v v

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

PCI Compliance Auditing and Forensics with Tectia Guardian

Becoming PCI Compliant

Computer Security DD2395

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Lab Configuring Syslog and NTP (Instructor Version)

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

White Paper. PCI Guidance: Microsoft Windows Logging

PCI DSS Requirements Version 2.0 Milestone Network Box Comments. 6 Yes

PCI Security Standards Council

Best Practices for PCI DSS V3.0 Network Security Compliance

Full Compliance Contents

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

University of Pittsburgh Security Assessment Questionnaire (v1.5)

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

USM IT Security Council Guide for Security Event Logging. Version 1.1

What is Auditing? IT 4823 Information Security Administration. Problems. Uses. Logger. Audit System Structure. Logging. Auditing. Auditing November 7

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

Guideline on Auditing and Log Management

PCI Requirements Coverage Summary Table

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Did you know your security solution can help with PCI compliance too?

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.

PCI DSS Reporting WHITEPAPER

Transcription:

Audit Logging Security Training by Arctec Group (www.arctecgroup.net) 1 Overall Goals Building Visibility In Audit Logging Domain Model 2 1

Authentication, Authorization, and Auditing 3 4 2

5 6 3

Auditing What to log (Source How to Do Application Logging Right Anton Chuvakin & Gunnar Peterson)" AAA (Authentication, Authorization, Access) Authentication/authorization decisions System access, data access Change System/application changes (especially privilege changes) Data change (creation and destruction are changes too) Badness / Threats Invalid input Resource Issues Resource exhausted, capacity exceeded, etc Limit reached Mixed Availability Issues Startups and shutdowns Faults and errors Backups success / failure 7 Introduction to Auditing What to log (Source How to Do Application Logging Right Anton Chuvakin & Gunnar Peterson)" Timestamp + TZ (when) System, application or component (where) User (who) Action (what) Status (result) Priority (severity, importance, rank, level, etc) Reason Logging Context Source IP (DNS name, other name, etc) Logging system (process, application, component, sub- component) Affected system (process, application, component, sub- component) 8 4

Designing For Failure Developer build applications to accomplish functional requirements - Place Order, Set Price, Execute trade Secure coding involves analyzing the software s failure modes and then design and development for modules to handle these failures in accordance with security policy, for example secure exception handlers that filter sensitive data out of raw exception messages 9 Security Principles: Defensible Networks Principle Defensible Networks can be watched Defensible Networks limit an intruder s freedom Defensible Networks offer a minimum number of services Defensible networks can be kept current Software Security Example Audit logging coverage is required for monitoring threats and control efficacy Audit logging differs from protection mechanisms, goal of audit logging Is facilitating response activities Audit logging must be placed in the key application and service chokepoints Must understand the patching and version management of apps and services Adapted from the Tao of Network Security Monitoring by Richard Bejtlich 10 5

Detection Lifecycle Collection: observed message exchanges and events Identification: first level categorization of audit log events Validation: categorizing audit log events and gathering additional context Escalation: forwarding audit log event and context for further handling Adapted from the Tao of Network Security Monitoring by Richard Bejtlich 11 Response Lifecycle Adapted from the Incident Response by van Wyk and Forno 12 6

Developer Logs Audit Logs Consumer Developers, Ops Security, Auditors Usage As needed Always on Content Exceptions, faults, errors Security incidents, attacks Scope Not known Pre-defined Time Scope Useful for limited time Useful for years And now a message from the Payment Card Industry Regularly Monitor and Test Networks Requirement 10: Track and monitor all access to network resources and cardholder data. Logging mechanisms and the ability to track user activities are critical in preventing, detecting, or minimizing the impact of a data compromise. The presence of logs in all environments allows thorough tracking, alerting, and analysis when something does go wrong. Determining the cause of a compromise is very difficult without system activity logs. 10.1 Establish a process for linking all access to system components (especially access done with administrative privileges such as root) to each individual user. 14 7

And now a message from the Payment Card Industry 10.2 Implement automated audit trails for all system components to reconstruct the following events: 10.2.1 All individual accesses to cardholder data 10.2.2 All actions taken by any individual with root or administrative privileges 10.2.3 Access to all audit trails 10.2.4 Invalid logical access attempts 10.2 5 Use of identification and authentication mechanisms 10.2.6 Initialization of the audit logs 10.2.7 Creation and deletion of system-level objects 15 And now a message from the Payment Card Industry 10.3 Record at least the following audit trail entries for all system components for each event: 10.3.1 User identification 10.3.2 Type of event 10.3.3 Date and time 10.3.4 Success or failure indication 10.3.4 Verify success or failure indication is included in log entries. 10.3.5 Origination of event 10.3.6 Identity or name of affected data, system component, or resource 16 8

And now a message from the Payment Card Industry 10.4 Synchronize all critical system clocks and times. 10.4.a Verify that a known, stable version of NTP (Network Time Protocol) or similar technology, kept current per PCI DSS Requirements 6.1 and 6.2, is used for time synchronization. 10.4.b Verify that internal servers are not all receiving time signals from external sources. [Two or three central time servers within the organization receive external time signals [directly from a special radio, GPS satellites, or other external sources based on International Atomic Time and UTC (formerly GMT)], peer with each other to keepaccurate time, and share the time with other internal servers.] 10.4.c Verify that specific external hosts are designated from which the timeservers will accept NTP time updates (to prevent a malicious individual from changing the clock). Optionally, those updates can be encrypted with a symmetric key, and access control lists can be created that specify the IP addresses of client machines that will be provided with the NTP service (to prevent unauthorized use of internal time servers). See www.ntp.org for more information 17 And now a message from the Payment Card Industry 10.5 Secure audit trails so they cannot be altered. 10.5.1 Limit viewing of audit trails to those with a job-related need. 10.5.2 Protect audit trail files from unauthorized modifications. 10.5.3 Promptly back up audit trail files to a centralized log server or media that is difficult to alter. 10.5.4 Write logs for external-facing technologies onto a log server on the internal LAN. 10.5.5 Use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed without generating alerts (although new data being added should not cause an alert). 18 9

And now a message from the Payment Card Industry 10.6 Review logs for all system components at least daily. Log reviews must include those servers that perform security functions like intrusion-detection system (IDS) and authentication, authorization, and accounting protocol (AAA) servers (for example, RADIUS). Note: Log harvesting, parsing, and alerting tools may be used to meet compliance with Requirement 10.6 10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example, online, archived, or restorable from back-up). More information at https:// www.pcisecuritystandards.org 19 Audit Logging Domain Model 20 10

Audit Logging Domain Model Event Observer Collects and records information based on policy Amount and type of information collected based on policy Collects sufficient information and context, example time and timezone based on policy and event types Output is directed based on configuration Often utilized at chokepoints 21 Audit Logging Domain Model Log Analyzer Reads log data from log source Discriminates based on event types May pull in additional context May perform correlation 22 11

Audit Logging Domain Model Notifier Used to inform Log Analyst Facilitates response activities 23 Audit Logging Domain Model Sanitizer: Logs often contain sensitive information, the log sanitizer filters or otherwise alters data Can use anonymous and pseudonymous modes Anonymizer: deletes or alters data so the recipient or originator cannot be identified Pseudonymizer: deletes of alters data so the log administrator can perform correlation such as for demographic purposes 24 12

Audit Logging Domain Model Browser Review log events Utilized by analyst May use information from Logger (view raw source) Analyzer (event types) Notifier (event lifecycle) Sanitizer (modes) 25 Audit Logging Design Considerations Audit Log Event Record Format Publishing & Storing Audit Log data Protecting the Log Data repository Integrating the Audit Logger to your application Building an Audit Log Browser What Goes Wrong (and how to fix it) 26 13

Audit Log Records Sources of Log Entry information Making the data useful What Events to Log AAA (Authentication, Authorization, Access) Change Badness / Threats Resource exhausted, capacity exceeded, etc Startups and shutdowns Securing the Audit Log events 27 XDAS Audit Log Record Format Header Originator Initiator Target Source Event-specific data 28 14

XDAS Audit Log Record Format Header Record Length " XDAS Record Format Version " Event Time Stamp " Time Uncertainty Interval " Time Uncertainty Indicator " Time Source " Time Zone " Event Number (user-provided) Event Outcome (user-provided). " 29 XDAS Audit Log Record Format Originator Originator Location Name " Originator Location Address " Originator Service Type " Originator Authentication Authority (required) Originator Principal Name (optional)" Originator Principal ID (required) " 30 15

XDAS Audit Log Record Format Initiator Initiator Authentication Authority " Initiator Domain-Specific Name (optional)" Initiator Domain-Specific ID " 31 XDAS Audit Log Record Format Target Target Location Name " Target Location Address " Target Service Type " Target Authentication Authority " Target Principal Name (optional) " Target Principal ID " 32 16

XDAS Audit Log Record Format Source Source Information String Event-specific data Event-Specific Data Information String 33 XDAS Event Types Account Management Events " Create Account" Delete Account" Disable Account" Enable Account" Query Account" Modify Account" 34 17

35 XDAS Event Types User Session Events " Create Session" Terminate Session" Query Session" Modify Session" 36 18

XDAS Event Types Data Item or Resource Element Management Events " Create Data Item" Delete Data Item" Query Data Item" Modify Data Item" 38 19

XDAS Event Types Service or Application Management Events" Install Service" Remove Service" Query Service Config" Modify Service Config" Disable Service" Enable Service" 39 XDAS Event Types Service or Application Utilization Events " Invoke Service Terminate Service Query Process Context Modify Process Context 40 20

XDAS Event Types Peer Association Management Events " Create Peer Association Terminate Peer Association Query Association Context Modify Association Context Receive Data via Association Send Data via Association 41 XDAS Event Types Data Item or Resource Element Content Access Events " Create Data Item Association Terminate Data Item Association Query Data Item Association Modify Data Item Association Query Data Item Contents Modify Data Item Contents 42 21

XDAS Event Types Exceptional Events " Start System Shutdown System Resource Exhaustion Resource Corrupted Backup Data Store Recover Data Store 43 XDAS Event Types Audit Service Management Events " Audit Subsystem Config" Audit Subsystem Diskspace Full" Audit Subsystem Diskspace Corrupt" 44 22

Publishing & Storing Audit Log data Logging Subsystem architecture Logging to database Logging to file system Building an Audit Logger API 45 Protecting the Log Data repository Tamper proof logs Authentication Through the looking glass - Logging access to the log data repository Encrypting Log Data Maintenance issues - key escrow 46 23

Building an Audit Log Browser Log browser design issues Log browser metadata Sorting audit log events Common report types 47 Sanitizer Placement 48 24

What Goes Wrong (and how to fix it) Sensitive Data in Logs Debug logging turned on in production Sensitive personal, financial or PII written to logs Logging System Unavailable Encoding Issues Handling Malicious data in logs Log Tampering Revisited Storage Issues Delayed Events Sequence Attacks 49 Audit Logging Checklist Concern Originator Initiator Target Event Observer Event Publisher Auditable Events Audit Record Format 50 25

References & Resources "Build Visibility In", Richard Bejtlich, http://taosecurity.blogspot.com/2009/08/build-visibility-in.html App Sensor at OWASP ESAPI CEE (Arcsight/Mitre) XDAS (Open Group) How to Do Application Logging Right by Anton Chuvakin & Gunnar Peterson http://arctecgroup.net/pdf/howtoapplogging.pdf Email: gunnar@arctecgroup.net 51 26