Security Audit Principles and Practices Chapter 11.

Slides:



Advertisements
Similar presentations
Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
Advertisements

1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
System Security Scanning and Discovery Chapter 14.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Intrusion Detection Systems and Practices
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Chapter 11 Monitoring and Analyzing the Web Environment.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 10: Collect and Analyze Performance Data.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 10 Conducting Security Audits.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security: Principles and Practice
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Maintaining and Updating Windows Server 2008
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Department Of Computer Engineering
Maintaining Windows Server 2008 File Services
Printing Terminology. Requirements for Network Printing At least one computer to operate as the print server Sufficient RAM to process documents Sufficient.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Security Guidelines and Management
Chapter 7 Database Auditing Models
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Maintaining Host Security Logs.  Security logs are invaluable for verifying whether the host's defenses are operating properly.  Another reason to maintain.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
CONTENTS:-  What is Event Log Service ?  Types of event logs and their purpose.  How and when the Event Log is useful?  What is Event Viewer?  Briefing.
Virtual Memory Tuning   You can improve a server’s performance by optimizing the way the paging file is used   You may want to size the paging file.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
Ch 11 Managing System Reliability and Availability 1.
Chapter 17: Watching Your System BAI617. Chapter Topics Working With Event Viewer Performance Monitor Resource Monitor.
1 Chapter Overview Planning an Audit Policy Implementing an Audit Policy Using Event Viewer.
10-Conducting Security Audits. Privilege Auditing Person’s access level over an object – User should be given minimal amount of privilege necessary to.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Information Systems Security Computer System Life Cycle Security.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Managing and Monitoring Windows 7 Performance Lesson 8.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Event Management & ITIL V3
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Overview Managing a DHCP Database Monitoring DHCP
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
NetTech Solutions Protecting the Computer Lesson 10.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
WebWatcher A Lightweight Tool for Analyzing Web Server Logs Hervé DEBAR IBM Zurich Research Laboratory Global Security Analysis Laboratory
Part 1: Corporate Operational benefits, Non-technical information for FSOs and ISSMs/ISSOs Part 2: Technical Tips on how to conduct a better audit review.
Role Of Network IDS in Network Perimeter Defense.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
Maintaining and Updating Windows Server 2008 Lesson 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Chapter 9 Intruders.
Maintaining Windows Server 2008 File Services
Security Methods and Practice CET4884
MONITORING MICROSOFT WINDOWS SERVER 2003
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Chapter 9 Intruders.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Security Audit Principles and Practices Chapter 11

Configuring Logging To configure logging, you should be prepared to answer the questions –What activities/events should be logged? –How long should logs be maintained? –What events should trigger immediate notifications to security administrators? Logging must be configured to the needs of the organization

Determining What Should Be Logged You can’t log everything –Unless you have a lot of time and resources –Someone must review logs –Logging has a negative effect on system performance –Critical events may be overwritten A prudent approach is to strike a balance between logging important events but not everything What is an important event is defined by the environment to some degree and should be given careful consideration

Determining How Long Logs Must Be Maintained Most operating systems allow you to overwrite log files based on time or file size –This choice may be determined by policy, e.g., log files must be kept for a certain amount of time Log files can be archived –You may need to maintain a (semi-) permanent record of system activity –Back up log files before they are overwritten –A common method is to alternate two log files, backing up one file while the other is active

Configuring Alerts With modern operating systems, you can set up alerts that notify administrators when specific events occur –For example, immediate notification if a hard drive is full Alert options include – , pagers, Short Message Service (SMS), instant messaging, pop-up windows, and cell phones Typically alerts can be configured differently depending on the severity of the event and the time –Only very severe events should trigger a cell phone call in the middle of the night, for example

Windows Logging Windows uses the Event Viewer as its primary logging mechanism –Found in Administrative Tools Event Viewer log files –Security log Records security-related events Controlled by a system administrator Typical information includes failed logon attempts and attempts to exceed privileges

Windows Logging (continued) Event Viewer log files (continued) –Application log Records events triggered by application software System administrators have control over what events to store –System log Contains events recorded by the operating system The system administrator generally has no control over this log Typical events include hardware/software problems –Other specialized log files include the directory service log, the file replication service log, and the DNS server log

Windows Logging (continued) Four types of events are stored in Event Viewer logs –Error events are created when a serious problem occurs (corruption of a file system) –Warning events are created to alert administrators to potential problems (a disk nearing capacity) –Information events are details of some activity that aren’t indications of a problem (starting or stopping a service) –Success/failure auditing events are administrator-defined events that can be logged when they succeed, when they fail, or both (unsuccessful logon attempts)

UNIX Logging The primary log facility in UNIX is syslog –Very flexible, many options for notification and priority –Can write to a remote log file allowing the use of dedicated syslog servers to track all activity on a network Syslog implements eight priority levels –LOG_EMERG (emergency), LOG_ALERT (require immediate intervention), LOG_CRIT (critical system events), LOG_ERR (error), LOG_WARNING (warn of potential errors), LOG_NOTICE (information, no error), LOG_INFO (future use), LOG_DEBUG (developers use for debugging)

Analyzing Log Data Log data is used to monitor your environment Two main activities –Profiling normal behavior to understand typical system behavior at different times and in different parts of your business cycle –Detecting anomalies when system activity significantly deviates from the normal behavior you have documented

Profiling Normal Behavior A “snapshot” of typical system behavior is called a baseline Baselines can be obtained at the network, system, user, and process level Baselines detail consumption of system resources Baselines will vary significantly based on time of day or business cycle It is the administrator’s responsibility to determine the baseline studies appropriate for an organization –These will change over time

Detecting Anomalies Define anomalies based on thresholds The following questions must be answered –How much of a deviation from the norm represents an anomaly? –How long must the deviation occur before registering an anomaly? –What anomalies should trigger immediate alerts? Anomalies can occur at any level –For example, if a user’s behavior deviates from normal, it may indicate a serious security event

Data Reduction When possible, limit the scope of logging activities to that which can reasonably be analyzed –However, regulations or policies may stipulate that aggressive logging is necessary Data reduction tools are useful when more data is collected than can be reviewed –Often built into security tools that create log files –For example, CheckPoint’s Firewall-1 allows you to view log files filtered by inbound TCP traffic to a specific port on a specific date

Maintaining Secure Logs Logs themselves must be protected from tampering and corruption Common techniques to secure logs include –Remote logging uses a centralized, highly protected, storage location –Printer logging creates a paper trail by immediately printing logged activity –Cryptographic technology digitally signs log files to ensure that changes can be detected, though the files are vulnerable until they are finalized

Conducting a Security Audit Security professionals examine the policies and implementation of the organization’s security posture –Identify deficiencies and recommend changes The audit team should be well trained and knowledgeable –The team may be multidisciplinary including accountants, managers, administrators, and technical professionals –Choose a team based on your organization’s needs

Checklists Checklists provide a systematic and consistent approach to completing various tasks in an audit –Audit checklists provide a high-level overview of the overall audit process stepwise processes for auditing different classes of systems –Configuration checklists contain specific configuration settings –Vulnerability checklists contain lists of critical vulnerabilities for each operating system in use

IP/Port Scanners IP/Port scanners are used by both crackers and system administrators –Use brute-force probing of IP addresses to identify open ports running services that may be vulnerable –Administrators can use this information to find rogue systems and services Often set up by legitimate users who want to bypass the red tape of going through administration –Rogue systems and services are usually either removed or brought under administrative control

Vulnerability Scanners Vulnerability scanners are software applications that analyze systems for known vulnerabilities and create reports and suggestions –First vulnerability scanner was SATAN in the early 1990s –Newer scanners include SARA – a descendant of SATAN (UNIX) SAINT – a commercially supported scanner (UNIX) Nessus – provides a scripting language for writing and sharing security tests (UNIX) Microsoft Baseline Security Analyzer – free from Microsoft, downloads the most recent vulnerability database (Windows)

Integrity Checking Integrity checking –Maintains cryptographic signatures of all protected files to catch tampering –Tripwire is the most common tool for file integrity assurance –Typically used to protect static Web sites and other systems that store critical data that is infrequently changed

Penetration Testing Penetration testing is a proactive approach used by security auditors The auditor tries to break in to the system to find vulnerabilities Many security teams bring in professionals to conduct penetration testing –Called “white hat” hackers –Malicious hackers are called “black hat” hackers Be sure you have proper permission before conducting any type of penetration testing

Audit Results The job doesn’t end with the audit Common post-audit tasks include –Reporting results –Prioritizing deficiencies that were found –Developing action plans for deficiencies –Implementing action plans based on priority and complexity –Conducting ongoing monitoring –Repeating the audit on a periodic basis

Summary Logging is the recording and analysis of system events to determine both normal system activity and anomalies in system activity You should strive for balance in determining what events should be logged Most logging software provides for considerable functionality and flexibility in configuring alerts –Be circumspect in how alerts are used The primary Windows logging tool is Event Viewer

Summary The primary UNIX logging facility is syslog A profile of normal system activity is called a baseline An anomaly is a significant deviation from a baseline, as determined by thresholds set by the administrator Logs files must be secured to avoid tampering Security auditing is used to identify problems in an organization’s security policies and controls A number of tools are available to auditors to assist in finding problems and making recommendations