SlideShare a Scribd company logo
Six Mistakes of Security Log Management  Dr Anton Chuvakin, GCIA, GCIH, GCFA Chief Logging Evangelist LogLogic, Inc
Summary System, Network and Security Logs Why Look at Logs? Brief Log Analysis  Overview From Log Analysis to Log Management  Log Mistakes: from 0  to 6
Log Data Overview Audit logs Transaction logs Intrusion logs Connection logs System performance records User activity logs Various alerts and other messages Firewalls/intrusion prevention Routers/switches Intrusion detection Servers, desktops, mainframes Business applications Databases Anti-virus VPNs What logs? From Where?
Login? Logon? Log in? <122> Mar  4 09:23:15 localhost sshd[27577]:  Accepted password  for kyle from ::ffff:192.168.138.35 port 2895 ssh2 <13> Fri Mar 17 14:29:38 2006 680 Security SYSTEM User Success Audit ENTERPRISE  Account Logon  Logon attempt by: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0    Logon account:  POWERUSER    Source Workstation: ENTERPRISE    Error Code: 0xC000006A     4574  <57> Dec 25 00:04:32:%SEC_LOGIN-5-LOGIN_SUCCESS: Login Success  [user:yellowdog] [Source:10.4.2.11] [localport:23] at 20:55:40 UTC Fri Feb 28 2006 <18> Dec 17 15:45:57 10.14.93.7 ns5xp: NetScreen device_id=ns5xp system-warning-00515: Admin User netscreen has  logged on  via Telnet from 10.14.98.55:39073 (2002-12-17 15:50:53)
“ Arrgh! Why Don’t We Just Ignore’Em?”
Log Management Mandate and Regulations Regulations Require LMI SOX GLBA FISMA JPA NIST 800-53 Capture audit records Regularly review audit records for unusual activity and violations Automatically process audit records Protect audit information from unauthorized deletion Retain audit logs PCI HIPAA SLAs Mandates Demand It PCI : Requirement 10 and  beyond Logging and user activities tracking are critical Automate and secure audit trails for event reconstruction Review logs daily Retain audit trail history for at least one year COBIT ISO ITIL COBIT 4 Provide audit trail for root-cause analysis Use logging to detect unusual or abnormal activities  Regularly review access, privileges, changes Verify backup completion ISO17799 Maintain audit logs for system access and use, changes, faults, corrections, capacity demands Review the results of monitoring activities regularly and ensure the accuracy of logs Controls Require it “ Get fined, Get Sanctioned” “ Lose Customers, Reputation, Revenue or Job” “ Get fined, Go To Jail”
Also: NIST 800-92 “This publication seeks to assist organizations in understanding the need for sound computer security log management. It provides  practical, real-world guidance on developing, implementing, and maintaining effective log management practices  throughout an enterprise. “
So, How Do People Do It?
Log Analysis Basics Manual ‘ Tail’, ‘more’, ‘grep’, ‘notepad’, etc Filtering Positive and  negative  (“Artificial ignorance”) Summarization  and reports “ Top X of Y” Visualization Log indexing and searching Correlation Rule-based and other Log data  mining
From Log Analysis to Log Management Threat  protection and discovery Incident  response Forensics , “e-discovery” and litigation support Regulatory  compliance Internal  policies  and procedure compliance Internal and external  audit  support IT system and network  troubleshooting IT  performance  management
Log Management Lifecycle Files, syslog, other Immutable Logs Secure Share Collect SNMP, Email, etc Alert Search, Report and Analytics Store Search Report Make  Conclusions “ As needed “ basis
Looks Complicated?! No Wonder People Make Mistakes …
Seven  Mistakes of Log Analysis and Management 0.  Not logging  at all. 1.  Not looking  at the logs 2. Storing logs for  too short a time 3.  Prioritizing  the log records  before  collection 4. Ignoring the logs from  applications 5. Approaching logs in a  siloed fashion
Mistake 0:  Not Logging AT ALL …   …  and its  aggravated  version : “… and not knowing that you don’t” No logging? ->  well , no logs  for incident response, audits, compliance Got logs? If your answer is ‘NO”, don’t listen further: run and enable logging right  now !
Example: Oracle Defaults :  minimum system logging minimum database server access no data access logging So, where is … data access audit schema and data change audit configuration change audit
Mistake 1:  Not looking at logs   Collection  of logs has value! But  review  boosts the value 10-fold  ( numbers are estimates    ) More in-depth  analysis  boosts it a lot more! Two choices here … Review after an incident  Ongoing review
Example Log Review Priorities DMZ NIDS DMZ firewall DMZ servers with applications Critical internal servers Other servers Select critical application Desktops Other applications
Mistake 2:  Storing logs for too short a time   You are saying you  HAD  logs? And how is it useful? Retention question  is a hard one. Truly, nobody has the answer! Seven years? A year? 90 days? A week? Until the disk runs out? Common : 90 days online and up to 1-3 years “nearline” or offline
Also A Mistake: Storing Logs for  TOO LONG?! Retention  =  storage  +  destruction Why  DESTROY LOGS ? Privacy regulations Litigation risk management  Due diligence and security policy System resource utilization
Example Retention Strategy Type + network + storage tier IDS + DMZ + online = 90 days Firewall + DMZ + online = 30 days Servers + internal + online = 90 days ALL + DMZ + archive = 3 years Critical + internal + archive = 5 years OTHER + internal + archive = 1 year
Quiz:  Name Which Are  Security Relevant ? System or software  startup, shutdown, restart, and abnormal termination  (crash) Various  thresholds being exceeded  or reaching dangerous levels such as disk space full, memory exhausted, or processor load too high Hardware health  messages that the system can troubleshoot or at least detect and log User access  to the system such as remote (telnet, ssh, etc.) and local login, network access (FTP) initiated to and from the system, failed and successful User access  privilege changes  such as the su command—both failed and successful User credentials and  access right changes , such as account updates, creation, and deletion—both failed and successful System  configuration changes  and software updates—both failed and successful
Mistake 3:  Deciding What’s Relevant Before Collection   How would you know what is … …  Security-relevant …  Compliance-relevant …  or will solve the problem you’d have  TOMORROW !? Also affects “ forensic quality”  of logs Prioritization Challenge – Got ESP?   Simple – just grab  everything!
Example Common Logging Order    Log  everything Retain  most everything Analyze  enough Summarize and report  on a  subset Look at  some Act in real-time on a  few
Mistake 4:  Ignoring Logs from Applications  Firewall –  Yes , Linux –  Yes , Windows –  Yes . NIDS –  Yes but … Oracle -  ? SAP -  ? Your Application X   – No? Log standards are coming:  MITRE CEE!
Example: Jumbled Mess of SAP Logs |22:01:40|BTC| 7|000|DDIC  |  |LC2|Systemerror when executing external command DB6_DATA_COLLECTOR on gneisenau ()  |22:02:32|BTC| 7|000|DDIC  |  |R49|Communication error, CPIC return code 020, SAP return code 456  |22:02:32|BTC| 7|000|DDIC  |  |R5A|> Conversation ID: 38910614  |22:02:32|BTC| 7|000|DDIC  |  |R64|> CPI-C function: CMSEND(SAP)  |22:02:32|BTC| 7|000|DDIC  |  |LC2|Systemerror when executing external command DB6_DATA_COLLECTOR on gneisenau ()
Mistake 5:  Siloed Approach to Log Management  Imagine… Database logs -> database monitoring system Syslog -> syslog server Windows log -> stay where they are Firewall logs -> PIX logger Application logs -> don’t exist   What about forensics, incident response, audit? How do you analyze the activities across systems?
Network Servers Databases Homegrown Applications Example Platform vs Siloes Log Silo ?????? ????? ???? ??? ?? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? LOGS ? ? ? ? ? ? ? ? ? ? ? ? Identity Management IT & Network Operations Operational Security Governance & Compliance Log Tool Log Jam Log platform Network Servers Databases Homegrown Applications Identity Management IT & Network Operations Operational Security Governance & Compliance
Conclusions Now you know: What are the logs? Where they come from? Why look at them? How people do it? What are some of the relevant regulations? How to deal with them? And how to  AVOID MISTAKES  in dealing with logs!
Seven  Mistakes of Log Analysis and Management 0.  Not logging  at all. 1.  Not looking  at the logs 2. Storing logs for  too short a time 3.  Prioritizing  the log records  before  collection 4. Ignoring the logs from  applications 5.  Only  looking at what  you  know is  bad 6. Approaching logs in a  siloed fashion
Thanks for Attending the Presentation Dr Anton Chuvakin, GCIA, GCIH, GCFA Chief Logging Evangelist http://www.chuvakin.org   Coauthor of “Security Warrior” (O’Reilly, 2004) and “PCI Compliance” (Syngress, 2007) See  http://www.info-secure.org   for my papers, books, reviews and other security resources related to logs. Book on logs is coming soon! Also see  http://chuvakin.blogspot.com
Further Reading Check out my longer paper “ Mistakes of Log Management ”, published at  http://www. infosecwriters.org   Other fun reading – section on  log management  on my blog  http://chuvakin.blogspot.com/search/label/log%20management/   My chapter on logging for PCI from “PCI Compliance” book (posted on Syngress web site)

More Related Content

PPT
Anton's Log Management 'Worst Practices'
PPTX
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
PPTX
PCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
PPTX
CISO's first 100 days
PDF
Beyond the Scan: The Value Proposition of Vulnerability Assessment
PPTX
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
PDF
Ruben Melendez - Economically Justifying IT Security Initiatives
PPTX
Building an AppSec Team Extended Cut
Anton's Log Management 'Worst Practices'
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
PCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
CISO's first 100 days
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Ruben Melendez - Economically Justifying IT Security Initiatives
Building an AppSec Team Extended Cut

What's hot (20)

PDF
Its Not You Its Me MSSP Couples Counseling
PPTX
Enterprise incident response 2017
PDF
Shift Left Security
PPTX
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
PPTX
The Six Stages of Incident Response - Auscert 2016
PPTX
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
PPT
Security Outsourcing - Couples Counseling - Atif Ghauri
PPSX
William Diederich - Security Certifications: Are They Worth the Investment? A...
PDF
Ofer Maor - Security Automation in the SDLC - Real World Cases
PPTX
Enterprise security management II
PDF
Incident Response: Don't Mess It Up, Here's How To Get It Right
PPTX
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
PPTX
Stay out of headlines for non compliance or data breach
PPTX
How To Build An Incident Response Function
PPTX
INFRAGARD 2014: Back to basics security
PDF
5 Steps to Improve Your Incident Response Plan
PDF
Is Your Vulnerability Management Program Irrelevant?
PPTX
Top 10 tips for effective SOC/NOC collaboration or integration
PPTX
Software Security Assurance - Program Building (You're going to need a bigger...
PPTX
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
Its Not You Its Me MSSP Couples Counseling
Enterprise incident response 2017
Shift Left Security
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
The Six Stages of Incident Response - Auscert 2016
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
Security Outsourcing - Couples Counseling - Atif Ghauri
William Diederich - Security Certifications: Are They Worth the Investment? A...
Ofer Maor - Security Automation in the SDLC - Real World Cases
Enterprise security management II
Incident Response: Don't Mess It Up, Here's How To Get It Right
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Stay out of headlines for non compliance or data breach
How To Build An Incident Response Function
INFRAGARD 2014: Back to basics security
5 Steps to Improve Your Incident Response Plan
Is Your Vulnerability Management Program Irrelevant?
Top 10 tips for effective SOC/NOC collaboration or integration
Software Security Assurance - Program Building (You're going to need a bigger...
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
Ad

Similar to Six Mistakes of Log Management 2008 (20)

PPT
O'Reilly Webinar Five Mistakes Log Analysis
PPT
CSI NetSec 2007 Six MIstakes of Log Management by Anton Chuvakin
PPTX
Log management
PPTX
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
PPT
NIST 800-92 Log Management Guide in the Real World
PPT
What Every Organization Should Log And Monitor
PPT
FIRST 2006 Full-day Tutorial on Logs for Incident Response
PPTX
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
PPT
Logs for Information Assurance and Forensics @ USMA
PPT
Six Mistakes of Log Management Teaser Preso
PPT
Choosing Your Log Management Approach: Buy, Build or Outsource
DOC
Audit logs for Security and Compliance
PPT
Application Logging Good Bad Ugly ... Beautiful?
PPT
Best practises for log management
PPT
Logs & The Law: What is Admissible in Court?
PPTX
Log maintenance network securiy
PPTX
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
PDF
Leveraging Log Management to provide business value
PPTX
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
PPT
Making Logs Sexy Again: Can We Finally Lose The Regexes?
O'Reilly Webinar Five Mistakes Log Analysis
CSI NetSec 2007 Six MIstakes of Log Management by Anton Chuvakin
Log management
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
NIST 800-92 Log Management Guide in the Real World
What Every Organization Should Log And Monitor
FIRST 2006 Full-day Tutorial on Logs for Incident Response
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Logs for Information Assurance and Forensics @ USMA
Six Mistakes of Log Management Teaser Preso
Choosing Your Log Management Approach: Buy, Build or Outsource
Audit logs for Security and Compliance
Application Logging Good Bad Ugly ... Beautiful?
Best practises for log management
Logs & The Law: What is Admissible in Court?
Log maintenance network securiy
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
Leveraging Log Management to provide business value
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
Making Logs Sexy Again: Can We Finally Lose The Regexes?
Ad

More from Anton Chuvakin (20)

PPTX
SecureWorld 2025 Keynote Déjà Vu All Over Again_ Learning from Cloud's Early...
PPTX
Detection Engineering Maturity - Helping SIEMs Find Their Adulting Skills
PPTX
Future of SOC: More Security, Less Operations
PPTX
SOC Meets Cloud: What Breaks, What Changes, What to Do?
PPTX
Meet the Ghost of SecOps Future by Anton Chuvakin
PPTX
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
PPTX
SOC Lessons from DevOps and SRE by Anton Chuvakin
PPTX
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
PPTX
20 Years of SIEM - SANS Webinar 2022
PPTX
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
PPTX
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
PPTX
SOCstock 2021 The Cloud-native SOC
PPTX
Modern SOC Trends 2020
PPTX
Anton's 2020 SIEM Best and Worst Practices - in Brief
PPTX
Generic siem how_2017
PPTX
Tips on SIEM Ops 2015
PPTX
Five SIEM Futures (2012)
PPTX
RSA 2016 Security Analytics Presentation
PPTX
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
PPTX
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
SecureWorld 2025 Keynote Déjà Vu All Over Again_ Learning from Cloud's Early...
Detection Engineering Maturity - Helping SIEMs Find Their Adulting Skills
Future of SOC: More Security, Less Operations
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Meet the Ghost of SecOps Future by Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SOC Lessons from DevOps and SRE by Anton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
20 Years of SIEM - SANS Webinar 2022
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2021 The Cloud-native SOC
Modern SOC Trends 2020
Anton's 2020 SIEM Best and Worst Practices - in Brief
Generic siem how_2017
Tips on SIEM Ops 2015
Five SIEM Futures (2012)
RSA 2016 Security Analytics Presentation
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin

Recently uploaded (20)

PDF
August Patch Tuesday
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
The various Industrial Revolutions .pptx
PDF
CloudStack 4.21: First Look Webinar slides
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Zenith AI: Advanced Artificial Intelligence
PPT
Geologic Time for studying geology for geologist
PDF
Unlock new opportunities with location data.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PPT
What is a Computer? Input Devices /output devices
August Patch Tuesday
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Web Crawler for Trend Tracking Gen Z Insights.pptx
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
observCloud-Native Containerability and monitoring.pptx
Group 1 Presentation -Planning and Decision Making .pptx
The various Industrial Revolutions .pptx
CloudStack 4.21: First Look Webinar slides
1 - Historical Antecedents, Social Consideration.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Tartificialntelligence_presentation.pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Zenith AI: Advanced Artificial Intelligence
Geologic Time for studying geology for geologist
Unlock new opportunities with location data.pdf
Getting started with AI Agents and Multi-Agent Systems
What is a Computer? Input Devices /output devices

Six Mistakes of Log Management 2008

  • 1. Six Mistakes of Security Log Management Dr Anton Chuvakin, GCIA, GCIH, GCFA Chief Logging Evangelist LogLogic, Inc
  • 2. Summary System, Network and Security Logs Why Look at Logs? Brief Log Analysis Overview From Log Analysis to Log Management Log Mistakes: from 0 to 6
  • 3. Log Data Overview Audit logs Transaction logs Intrusion logs Connection logs System performance records User activity logs Various alerts and other messages Firewalls/intrusion prevention Routers/switches Intrusion detection Servers, desktops, mainframes Business applications Databases Anti-virus VPNs What logs? From Where?
  • 4. Login? Logon? Log in? <122> Mar 4 09:23:15 localhost sshd[27577]: Accepted password for kyle from ::ffff:192.168.138.35 port 2895 ssh2 <13> Fri Mar 17 14:29:38 2006 680 Security SYSTEM User Success Audit ENTERPRISE Account Logon Logon attempt by: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0    Logon account:  POWERUSER    Source Workstation: ENTERPRISE    Error Code: 0xC000006A     4574 <57> Dec 25 00:04:32:%SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user:yellowdog] [Source:10.4.2.11] [localport:23] at 20:55:40 UTC Fri Feb 28 2006 <18> Dec 17 15:45:57 10.14.93.7 ns5xp: NetScreen device_id=ns5xp system-warning-00515: Admin User netscreen has logged on via Telnet from 10.14.98.55:39073 (2002-12-17 15:50:53)
  • 5. “ Arrgh! Why Don’t We Just Ignore’Em?”
  • 6. Log Management Mandate and Regulations Regulations Require LMI SOX GLBA FISMA JPA NIST 800-53 Capture audit records Regularly review audit records for unusual activity and violations Automatically process audit records Protect audit information from unauthorized deletion Retain audit logs PCI HIPAA SLAs Mandates Demand It PCI : Requirement 10 and beyond Logging and user activities tracking are critical Automate and secure audit trails for event reconstruction Review logs daily Retain audit trail history for at least one year COBIT ISO ITIL COBIT 4 Provide audit trail for root-cause analysis Use logging to detect unusual or abnormal activities Regularly review access, privileges, changes Verify backup completion ISO17799 Maintain audit logs for system access and use, changes, faults, corrections, capacity demands Review the results of monitoring activities regularly and ensure the accuracy of logs Controls Require it “ Get fined, Get Sanctioned” “ Lose Customers, Reputation, Revenue or Job” “ Get fined, Go To Jail”
  • 7. Also: NIST 800-92 “This publication seeks to assist organizations in understanding the need for sound computer security log management. It provides practical, real-world guidance on developing, implementing, and maintaining effective log management practices throughout an enterprise. “
  • 8. So, How Do People Do It?
  • 9. Log Analysis Basics Manual ‘ Tail’, ‘more’, ‘grep’, ‘notepad’, etc Filtering Positive and negative (“Artificial ignorance”) Summarization and reports “ Top X of Y” Visualization Log indexing and searching Correlation Rule-based and other Log data mining
  • 10. From Log Analysis to Log Management Threat protection and discovery Incident response Forensics , “e-discovery” and litigation support Regulatory compliance Internal policies and procedure compliance Internal and external audit support IT system and network troubleshooting IT performance management
  • 11. Log Management Lifecycle Files, syslog, other Immutable Logs Secure Share Collect SNMP, Email, etc Alert Search, Report and Analytics Store Search Report Make Conclusions “ As needed “ basis
  • 12. Looks Complicated?! No Wonder People Make Mistakes …
  • 13. Seven Mistakes of Log Analysis and Management 0. Not logging at all. 1. Not looking at the logs 2. Storing logs for too short a time 3. Prioritizing the log records before collection 4. Ignoring the logs from applications 5. Approaching logs in a siloed fashion
  • 14. Mistake 0: Not Logging AT ALL … … and its aggravated version : “… and not knowing that you don’t” No logging? -> well , no logs for incident response, audits, compliance Got logs? If your answer is ‘NO”, don’t listen further: run and enable logging right now !
  • 15. Example: Oracle Defaults : minimum system logging minimum database server access no data access logging So, where is … data access audit schema and data change audit configuration change audit
  • 16. Mistake 1: Not looking at logs Collection of logs has value! But review boosts the value 10-fold ( numbers are estimates  ) More in-depth analysis boosts it a lot more! Two choices here … Review after an incident Ongoing review
  • 17. Example Log Review Priorities DMZ NIDS DMZ firewall DMZ servers with applications Critical internal servers Other servers Select critical application Desktops Other applications
  • 18. Mistake 2: Storing logs for too short a time You are saying you HAD logs? And how is it useful? Retention question is a hard one. Truly, nobody has the answer! Seven years? A year? 90 days? A week? Until the disk runs out? Common : 90 days online and up to 1-3 years “nearline” or offline
  • 19. Also A Mistake: Storing Logs for TOO LONG?! Retention = storage + destruction Why DESTROY LOGS ? Privacy regulations Litigation risk management Due diligence and security policy System resource utilization
  • 20. Example Retention Strategy Type + network + storage tier IDS + DMZ + online = 90 days Firewall + DMZ + online = 30 days Servers + internal + online = 90 days ALL + DMZ + archive = 3 years Critical + internal + archive = 5 years OTHER + internal + archive = 1 year
  • 21. Quiz: Name Which Are Security Relevant ? System or software startup, shutdown, restart, and abnormal termination (crash) Various thresholds being exceeded or reaching dangerous levels such as disk space full, memory exhausted, or processor load too high Hardware health messages that the system can troubleshoot or at least detect and log User access to the system such as remote (telnet, ssh, etc.) and local login, network access (FTP) initiated to and from the system, failed and successful User access privilege changes such as the su command—both failed and successful User credentials and access right changes , such as account updates, creation, and deletion—both failed and successful System configuration changes and software updates—both failed and successful
  • 22. Mistake 3: Deciding What’s Relevant Before Collection How would you know what is … … Security-relevant … Compliance-relevant … or will solve the problem you’d have TOMORROW !? Also affects “ forensic quality” of logs Prioritization Challenge – Got ESP?  Simple – just grab everything!
  • 23. Example Common Logging Order Log everything Retain most everything Analyze enough Summarize and report on a subset Look at some Act in real-time on a few
  • 24. Mistake 4: Ignoring Logs from Applications Firewall – Yes , Linux – Yes , Windows – Yes . NIDS – Yes but … Oracle - ? SAP - ? Your Application X – No? Log standards are coming: MITRE CEE!
  • 25. Example: Jumbled Mess of SAP Logs |22:01:40|BTC| 7|000|DDIC | |LC2|Systemerror when executing external command DB6_DATA_COLLECTOR on gneisenau () |22:02:32|BTC| 7|000|DDIC | |R49|Communication error, CPIC return code 020, SAP return code 456 |22:02:32|BTC| 7|000|DDIC | |R5A|> Conversation ID: 38910614 |22:02:32|BTC| 7|000|DDIC | |R64|> CPI-C function: CMSEND(SAP) |22:02:32|BTC| 7|000|DDIC | |LC2|Systemerror when executing external command DB6_DATA_COLLECTOR on gneisenau ()
  • 26. Mistake 5: Siloed Approach to Log Management Imagine… Database logs -> database monitoring system Syslog -> syslog server Windows log -> stay where they are Firewall logs -> PIX logger Application logs -> don’t exist  What about forensics, incident response, audit? How do you analyze the activities across systems?
  • 27. Network Servers Databases Homegrown Applications Example Platform vs Siloes Log Silo ?????? ????? ???? ??? ?? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? LOGS ? ? ? ? ? ? ? ? ? ? ? ? Identity Management IT & Network Operations Operational Security Governance & Compliance Log Tool Log Jam Log platform Network Servers Databases Homegrown Applications Identity Management IT & Network Operations Operational Security Governance & Compliance
  • 28. Conclusions Now you know: What are the logs? Where they come from? Why look at them? How people do it? What are some of the relevant regulations? How to deal with them? And how to AVOID MISTAKES in dealing with logs!
  • 29. Seven Mistakes of Log Analysis and Management 0. Not logging at all. 1. Not looking at the logs 2. Storing logs for too short a time 3. Prioritizing the log records before collection 4. Ignoring the logs from applications 5. Only looking at what you know is bad 6. Approaching logs in a siloed fashion
  • 30. Thanks for Attending the Presentation Dr Anton Chuvakin, GCIA, GCIH, GCFA Chief Logging Evangelist http://www.chuvakin.org Coauthor of “Security Warrior” (O’Reilly, 2004) and “PCI Compliance” (Syngress, 2007) See http://www.info-secure.org for my papers, books, reviews and other security resources related to logs. Book on logs is coming soon! Also see http://chuvakin.blogspot.com
  • 31. Further Reading Check out my longer paper “ Mistakes of Log Management ”, published at http://www. infosecwriters.org Other fun reading – section on log management on my blog http://chuvakin.blogspot.com/search/label/log%20management/ My chapter on logging for PCI from “PCI Compliance” book (posted on Syngress web site)

Editor's Notes

  • #2: “ Six Mistakes of Log Management” Anton Chuvakin, Ph.D., GCIA, GCIH, GCFA Director of Product Management @ LogLogic, Inc Top Log Mistakes #1 not logging at all. #2 not looking at the logs #3 storing logs for too short a time #4 prioritizing the log records before collection #5 ignoring the logs from applications #6 only looking at what they know is bad Since I wrote my log mistakes paper a few years ago, the domain of log analysis changed a lot. Many factors affected it; among those are new regulatory compliance requirements, wider adoption of “best practice” and governance frameworks such as ISO, COBIT and ITIL as well as new technologies with their log files. New standards, such as NIST 800-92 Guide, have been created. Thus, I am updating this article with newly committed mistakes as well as new prospective on the old ones. Thus, this article, just like its predecessor , again covers the typical mistakes organizations make while approaching management of computer logs and other records produced by IT infrastructure components. As digital technology continues to spread (“A web-enabled fridge , anybody? Its just 8 (!) grand today, you know”  ) and computers start playing even more important role in our lives (I do have a penchant for the obvious , don’t I?  ), the records that they produce, a.k.a. logs, start to play bigger and bigger role. From firewalls and intrusion prevention systems to databases and enterprise applications to wireless access points and VOIP gateways, logs are being spewed forth at an every increasing pace. Both security and other IT components not only increase in numbers, but often come with more logging enabled out of the box. Example of that trend include Linux systems as well as web servers that now ship with increased level of logging. All those systems, both legacy and novel, are known to generate copious amounts of logs, audit trails, records and alerts, that beg for constant attention. Thus, many companies and government agencies are trying to set up repeatable log collection, centralization and analysis processes and tools. However, when planning and implementing log collection and analysis infrastructure, the organizations often discover that they are not realizing the full promise of such a system and, in fact, sometimes notice that the efficiency is not gained but lost as a result. This often happens due to the following common log analysis mistakes. We will start from the obvious, but unfortunately all too common even in this age of Sarbanes-Oxley and PCI. This mistake destroys all possible chances of benefiting from logs. It is the mistake #1 : not logging at all. The more exciting flavor of this mistake is: “not logging and not even knowing it until it is too late.” How can it be “too late”, some say? “Its just logs!” Welcome to 2006! Not having “just logs” can lead to losing your income (PCI that contain logging requirements implies that violations might lead to your credit card processing privileges being cancelled by Visa or Mastercard and thus putting you out of business), reputation (somebody stole a few credit card number from your database, but the media reported that all of the 40 million credit card have been stolen since you were unable to prove otherwise) or even your freedom (see various Sarbanes-Oxley horror stories in the media) Even better-prepared organizations fall for this one. Here is a recent example. Does your web server have logging enabled? Sure, it is a default option on both of the popular web servers: Apache and Microsoft IIS. Does your server operating system log messages? Sure, nobody cancelled /var/log/messages . But does your database ? Oops! Default option in Oracle is to not do any audit logging. Maybe MS SQL fares better? Nope, same thing, you need to dig deep in the system to even start a moderate level of audit trail generation. Thus, to avoid this mistake one needs to sometimes go beyond the defaults and make sure that the software and hardware deployed does have some level of logging enabled. In case of Oracle, for example, it might boil down to making sure that the ‘ audit_trail’ variable is set to ‘db’; for other systems it might be more complicated. #2 Not looking at the logs is the second mistake. While making sure that logs do exist and then collecting and storing them is important, it is only a means to an end – knowing what is going on in your environment and being able to respond to it as well as possibly predict what will happen later. Thus, once the technology is in place and logs are collected, there needs to be a process of ongoing monitoring and review that hooks into actions and possible escalations, if needed. In addition, personnel reviewing or monitoring logs should have enough information to be able to determine what they really mean and what – if any – action is required. It is worthwhile to note that some organizations take a half-step in the right direction: they only review logs (provided they didn’t commit the first mistake and they actually have something to review) after a major incident (be it a compromise, information leak or a mysterious server crash) and avoid ongoing monitoring and log review, often by quoting “the lack of resources”. This gives them the reactive benefit of log analysis, which is important, but fails to realize the proactive one – knowing when bad stuff is about to happen or become worse. For example, if you review logs, you might learn that the failover was activated on a firewall, and, even though the connection stayed on, the incident is certainly worth looking into. If you don’t and your network connectivity goes away, you’d have to rely on your ever-helpful logs in investigation why *both* failover devices went down … In fact, looking at logs proactively helps organizations to better realize the value of their existing network, security and system infrastructure. It is also critical to stress that some types of organizations have to look at log files and audit tracks due to regulatory pressure of some kind. For example, US HIPAA regulation compels medical organizations to establish audit record and analysis program (even though the enforcement action is notorious lacking). In the even more extreme case, PCI (Payment Card Industry) security standard has provisions for both log collection and log monitoring and periodic review, highlighting the fact that collection of logs does not stand on its own. #3 The third common mistake is storing logs for too short a time . This makes the security or IT operations team think they have all the logs needed for monitoring and investigation or troubleshooting and then leading to the horrible realization after the incident that all logs are gone due to their shortsighted retention policy. It often happens (especially in the case of insider attacks) that the incident is discovered a long time – sometimes many months - after the crime or abuse has been committed. One might save some money on storage hardware, but lose the tenfold due to regulatory fines. If low cost is critical, the solution is sometimes in splitting the retention in two parts: shorter-term online storage (that costs more) and long-term offline storage (that is much cheaper). A better three-tier approach is also common and resolves some of the limitations of the previous one. In this case, shorter-term online storage is complemented by a near-line storage where logs are still accessible and searchable. The oldest and the least relevant log records are offloaded to the third tier, such as tape or DVDs, where they can be stored inexpensively, but without any way to selectively access the needed logs. More specifically, one financial institution was storing logs online for 90 days, then in the near-line searchable storage for 2 years and then on tape for up to 7 years or even more. #4 The fourth mistake is related to log record prioritization. While people need a sense of priority to better organize their log analysis efforts, the common mistake nowadays is in prioritizing the log records before collection. In fact, even some “best practice” documents recommend only collecting “the important stuff.” But what is important? This is where the above guidance documents fall short by not specifying it in any useful form. While there are some approaches to the problem, all that I am aware of can lead to glaring holes in security posture or even undermine the regulatory compliance efforts. For example, many people would claim that network intrusion detection and prevention logs are inherently more important than, say, VPN concentrator logs. Well, it might be true in the world where external threats completely dominate the insider abuse (i.e. not in this one). VPN logs, together with server and workstation logs, is what you would most likely need to conduct an internal investigation about the information leak or even a malware infection. Thus, similar claims about the elevated importance of whatever other log type can be similarly disputed, which would lead us to a painful realization that you do need to collect everything. But can you? Before you answer this, try to answer whether you can make the right call on which log is more important even before seeing it and this problem will stop looking unsolvable. In fact, there are cost-effective solutions to achieve just that. The mistake #5 is in ignoring the logs from applications , by only focusing on the perimeter and internal network devices and possibly also servers, but not going “higher up the stack” to look at the application logging. The realm of enterprise applications ranges from SAPs and PeopleSofts of the worlds to small homegrown applications, which nevertheless handle mission-critical processes for many enterprises. Legacy applications, running on mainframes and midrange systems, are out there as well, often running the core business processes as well. The availability and quality of logs differs wildly across the application, ranging from missing (the case for many home-grown applications) to extremely detailed and voluminous (the case for many mainframe applications). Lack of common logging standards and even of logging guidance for software developers lead to many challenges with application logs. Despite the challenges, one needs to make sure that the application logs are collected and made available for analysis as well as for longer term-retention. This can be accomplished by configuring your log management software to collect them and by establishing a log review policy, both for the on-incident review and periodic proactive log review. #6 Even the most advanced and mature organizations fall into the pitfall of the sixth error. It is sneaky and insidious, and can severely reduce the value of a log analysis project. It occurs when organization is only looking at what they know is bad in the logs . Indeed, a vast majority of open source and some commercial tools are set up to filter and look for bad log lines, attack signatures, critical events, etc. For example, “swatch” is a classic free log analysis tool that is powerful, but only at one thing: looking for defined bad things in log files. Moreover, when people talk about log analysis they usually mean sifting through logs looking for things of note. However, to fully realize the value of log data one has to take it to the next level to log mining: actually discovering things of interest in log files without having any preconceived notion of ‘what we need to find’. It sounds obvious - how can we be sure that we know of all the possible malicious behavior in advance – but it disregarded so often. Sometimes, it is suggested that it is simpler to just list all the known good things and then look for the rest. It sounds like a solution, but such task is not only onerous, but also thankless: it is usually even harder to list all the good things than it is to list all the bad things that might happen on a system or network. So many different things occur, malfunction or misbehave, that weeding out attack traces just by listing all the possibilities is not effective. A more intelligent approach is needed! Some of the data mining (also called “knowledge discovery in databases” or KDD) and visualization methods actually work on log data with great success. They allow organizations to look for real anomalies in log data, beyond ‘known bad’ and ‘known good’. To conclude, avoiding the above six mistakes we covered will take your log analysis program to a next level and enhance the value of the existing security and logging infrastructures. Dr Anton Chuvakin, GCIA, GCIH, GCFA (http://www.chuvakin.org) is a recognized security expert and book author. He currently works at LogLogic, where he is involved with defining and executing on a product vision and strategy, driving the product roadmap, conducting research as well as assisting key customers with their LogLogic implementations. He was previously a Security Strategist with a security information management company. He is an author of a book &amp;quot;Security Warrior&amp;quot; and a contributor to &amp;quot;Know Your Enemy II&amp;quot;, &amp;quot;Information Security Management Handbook&amp;quot;, &amp;quot;Hacker&apos;s Challenge 3&amp;quot; and the upcoming book on PCI. Anton also published numerous papers on a broad range of security subjects. In his spare time he maintains his security portal http://www.info-secure.org and several blogs.