Security Auditing CS460/ECE422 Spring 2012. Reading Material Chapter 18 of text.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
BalaBit Shell Control Box
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
Computer Security: Principles and Practice
NetComm Wireless Logging Architecture Feature Spotlight.
Access Control Chapter 3 Part 5 Pages 248 to 252.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Security Controls – What Works
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Syslogd Tracking system events. Log servers Applications are constantly encountering events which should be recorded –users attempt to login with bad.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Chapter 7 Database Auditing Models
Information Networking Security and Assurance Lab National Chung Cheng University Investigating Unix System.
PMI Inventory Tracker™
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Configuration Management
Computer Security: Principles and Practice
AfChix 2011 Blantyre, Malawi Log management. Log management and monitoring ■ What is log management and monitoring ? ● It's about keeping your logs in.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Security Guidelines and Management
Chapter 7 Database Auditing Models
CSIS Database Security, Dr. Guimaraes Adapted from Afyouni, Database Security and Auditing Database Auditing (Ch. 7) Overview of Auditing Overview.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Virtual Memory Tuning   You can improve a server’s performance by optimizing the way the paging file is used   You may want to size the paging file.
Network and Active Directory Performance Monitoring and Troubleshooting NETW4008 Lecture 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Auditing for Security Management By Cyril Onwubiko Network Security Analyst at COLT Telecom Invited Guest Lecture delivered at London Metropolitan University,
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
CIS 218 Advanced UNIX 1 User and System Information CIS 218.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
System Monitoring and Automation CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Module 7: Fundamentals of Administering Windows Server 2008.
Event Management & ITIL V3
System Monitoring and Automation. 2 Section Overview Automation of Periodic Tasks Scheduling and Cron Syslog Accounting.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
LMA: Log Mail Analyzer Maurizio Aiello National Research Council Institute of Electronics and Telecommunications and Information.
Part 11, Electronic Records; Electronic Signatures
Ch11: Syslog and Logfiles Presented by: Apichana Thiantanawat 06/11/02.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
AUDIT IN COMPUTERIZED ENVIRONMENT
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Cosc 4750 Log files Logging policies Throw away all data immediately Reset log files at periodic intervals Rotate logs files, keeping data for a fixed.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Understand Audit Policies LESSON Security Fundamentals.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Unit 2 Personal Cyber Security and Social Engineering Part 2.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
SQL Database Management
Architecture Review 10/11/2004
Securing Network Servers
Working at a Small-to-Medium Business or ISP – Chapter 8
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008
Log management AfNOG 2008 Rabat, Morocco.
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 5 Mumtaz Ali Rajput +92 – 301-
Chapter 8: Monitoring the Network
Lesson 16-Windows NT Security Issues
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Security Auditing CS460/ECE422 Spring 2012

Reading Material Chapter 18 of text

General Definition of Audit From Wikipedia – The general definition of an audit is an evaluation of a person, organization, system, process, enterprise, project or product. – Audits are performed to ascertain the validity and reliability of information; also to provide an assessment of a system's internal control. The goal of an audit is to express an opinion of the person / organization / system (etc.) in question, under evaluation based on work done on a test basis.validity reliability assessmentinternal control

Security Audit Security audit – An independent review and examination of a system’s records and activities to determine the adequacy of system controls, ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes. Security audit trail – A chronological record of system activities that is sufficient to enable the reconstruction and examination of the sequence of environments and activities surrounding or leading to an operation, procedure, or event in a security-relevant transaction.

Logging Application or system logging events – Create security audit trail – Debugging services/daemons – Input to intrusion detection/correlation engines

General Audit Architecture

CC Audit Functional Requirements

What to log? Session initialization Authentication information Authorization decisions Access to sensitive data Changes to security policy Key system calls Network connections Everything?

Audit Event Analysis Need to log enough information to review correct enforcement of security policy – Don’t collect enough, miss security-relevant actions – Collect too much, negatively impact performance Some events dictated by need to comply with laws or industry standards – E.g., HIPPA, SOX, GLB, PCI Timestamped Events to consider – Session initialization (login/network) – Changes to security policy system – Access/modify sensitive data – Statistical information

Example Audit Events Database containing customer sensitive information. What audit events should be logged?

Storing Audit Trail Ideally, infinite write-only log Realistic options – Read/Write media with appropriate OS access controls – Write-once media such as CD-ROM – Write-only media such as paper – Write-Once Read-Many drives (WORM) – Networked system What should happen when audit trail space is exhausted? Archiving – How long should the audit trail be stored? – Where should it be stored?

Windows Event Log Three sublogs – Security Log – generated by local security authority – System Log – generated by system services, drivers, components or applications affecting system health – Application Log – generated by applications. Open to any application Each event contains – Numeric ID – Timestamp – Set of attributes, e.g. task, opcode, level, version, keywords – Programmer-specified data Can be exported to XML form for external analysis

Example Windows Security Event Log Name: Security Source: Microsoft-Windows-Security-Auditing Date: 11/5/ :58:50 AM Event ID: 5061 Task Category: System Integrity Level: Information Keywords: Audit Success User: N/A Computer: Rhino Description: Cryptographic operation. Subject: Security ID:LOCAL SERVICE Account Name:LOCAL SERVICE Account Domain:NT AUTHORITY Logon ID:0x3e5 Cryptographic Parameters: Provider Name:Microsoft Software Key Storage Provider Algorithm Name:RSA Key Name:5917ebdc f30-a9fd-0f6d0e25d463 Key Type:Machine key. Cryptographic Operation: Operation:Open Key. Return Code:0x0

Syslog Event Logging system supported on Unix/Linux. – Events can be sent across the network. Generally using UDP. Syslog events generated by most network devices. Every event contains – PRI: The facilities and severity values (see next page) – Header: Timestamp hostname or IP – MSG: TAG – name of generating program or process CONTENT – details of message

Syslog Facilities Identifies at a coarse level the entity that generated the log – User – user process – Kern – system kernel – Mail – system – Daemon – system daemon – Auth – authorization program – Lpr – printing system – News – UseNet news system – UUCP – UUCP system – Cron – cron or at – Local0-7 – Up to 8 locally defined categories – Mark – syslog, for timestamping logs

Syslog Severity Levels Levels – Emerg – Most sever messages such as immediate system shutdown – Alert – system conditions requiring immediate attention – Crit – critical system issues such as failing hardware – Err – other system errors – Warning – warning messages – Notice – unusual situation that merits investigation – Info – informational messages – Debug – messages for debugging purposes. Can set severity level at system or application level – E.g., set application’s syslog level to Err Application will ignore calls generate info level syslog messages Application will generate syslog messages for severity levels of err and above

Example syslog message From the auth.log on a unix system – Nov 27 12:16:19 lab1 sshd[19556]: Accepted password for root from XX.XX.XX.XX port ssh2

Network Security Events Network Device generates syslog messages Intrusion Detection Device creates events Netflow Events – Track the start and end of network flows Encodes 5 tuple and timestamps – Generated directly by Cisco devices – Created indirectly by network appliances

Ensuring Applications Audit Review/rewrite application to insert audit log calls Interpose library – Use dynamically linked library to audit then perform the original library call – E.g., Audit the open of a file before calling open() or fopen() or CreateFile()

Audit Analysis Originally envisioned to be direct human analysis – Still the case for some forensic analysis, but generally some analysis tools are used Baselining – Understand the time of audit events generated in normal situations. Do anomaly detection against the baseline Never Seen Before – DHCP example Thresholding – only concerned if events fall beyond a threshold – E.g., volume of data acquired or number of failed connections Windowing – only concerned with events that fall outside a timing window – E.g., login events outside the normal office hours

Example Audit Analysis Systems Security information and event management (SIEM) NetForensics rmation_management/ rmation_management/ Cisco MARS – discussed in text LogLogic

Cisco MARS Steps Parse Log Events – Very hard to keep up all devices and versions of software. Log messages containing critical information are generally free-form. Normalize information to a common log format Perform correlation analysis to link related events – Create sessions Run sessions and unrelated events against rule engine Do some fixups to avoid false positives

Conclusions Audit Trail is necessary – Tends to be overlooked or haphazardly generated – No direct functional benefit – Essential to determine that things are operating per security policy requirements Audit Trail Analysis – Valuable source of information for unexpected action – Difficult to keep up to date with changes to audit message format