CH18 CompSec4e
CH18 CompSec4e
CH18 CompSec4e
• Introduction of objects
• Deletion of objects
• Distribution or revocation of access rights or capabilities
• Changes to subject or object security attributes
• Policy checks performed by the security software
• Use of access rights to bypass a policy check
• Use of identification and authentication functions
• Security-related actions taken by an operator/user
• Import/export of data from/to removable media
Event Detection
• Appropriate hooks must be available in the application and
system software to enable event detection
• Monitoring software needs to be added to the system and to
appropriate places to capture relevant activity
• An event recording function is needed, which includes the
need to provide for a secure storage resistant to tampering or
deletion
• Event and audit trail analysis software, tools, and interfaces
may be used to analyze collected data as well as for
investigating data trends and anomalies
• There is an additional requirement for the security of the
auditing function
• Auditing system should have a minimal effect on functionality
Implementation Guidelines
Audit tests that could
Agree on audit affect system availability All access should be
requirements with should be run outside monitored and logged to
appropriate management business hours produce a reference trail
Auditable
Items
Suggested
in X.816
Table 18.3
Monitoring Areas Suggested in ISO 27002
Physical Access Audit Trails
• Generated by equipment that controls physical
access
• Card-key systems, alarm systems
• Sent to central host for analysis and storage
• Data of interest:
• Date/time/location/user of access attempt
• Both valid and invalid access attempts
• Attempts to add/modify/delete physical access privileges
• May send violation messages to personnel
Protecting Audit Trail Data
Read/write file on Write-once/read-
host many device
• Easy, least resource • More secure but less
intensive, instant convenient
access • Need steady supply of
• Vulnerable to attack by recordable media
intruder • Access may be delayed
and not available
immediately
Windows
Event
Schema
Elements
Account
Privilege use
management
Policy Directory
changes service access
Elements:
API referenced by
Command used to Configuration file
several standard Daemon to
add single-line used to control the
system utilities and receive/route log
entries to the system logging and routing
available to events
log of system log events
application programs
Syslog Service
Basic service provides:
A means of capturing
relevant events
Extra add-on features may
include:
A storage facility
UNIX syslog
Facilities and
Severity Levels
• Vulnerabilities exploited:
• Lack of dynamic checks on input data
• Loadable modules
• Can be automatically loaded and unloaded on demand
Audit Trail Analysis
• Analysis programs and procedures vary widely
• Must understand context of log entries
• Relevant information may reside in other entries in the
same logs, other logs, and nonlog sources
Baselining
• Define normal versus unusual events/patterns
• Compare with new data to detect changes
• Thresholding is the identification of data that exceed a particular baseline
value
Windowing
• Detection of events within a given set of parameters
Correlation
• Seeks relationships among events
SIEM Systems
• Software is a centralized logging software package
similar to, but much more complex than, syslog
• Provide a centralized, uniform audit trail storage facility
and a suite of audit data analysis programs
• There are two general configuration approaches:
• Agentless
• SIEM server receives data from the individual log generating hosts without
needing to have any special software installed on those hosts
• Agent-based
• An agent program is installed on the log generating host to perform event
filtering and aggregation and log normalization for a particular type of log,
and then transmit the normalized log data to a SIEM server, usually on a
real-time or near-real-time basis for analysis and storage
SIEM Software
SIEM software is able to recognize a variety of log formats, including
those from a variety of OSs, security software, application servers, and
even physical security control devices such as badge readers
Software normalizes these various log entries so that the same format is
used for the same data item in all entries
Software can delete fields in log entries that are not needed for the
security function and log entries that are not relevant
SIEM server analyzes the combined data from the multiple log sources,
correlates events among the log entries, identifies and prioritizes
significant events, and initiates responses to events if desired
Summary
• Security auditing • Implementing the
architecture logging function
• Security audit and alarms model • Logging at the system level
• Security auditing functions • Logging at the application
• Requirements level
• Implementation guidelines • Interposable libraries
• Dynamic binary rewriting
• Security audit trail
• What to collect • Audit trail analysis
• Protecting audit trail data • Preparation
• Timing
• Security information and • Audit review
event management • Approaches to data analysis
• SIEM systems