SlideShare a Scribd company logo
What Every Organization  Should  Log and Monitor: A Checklist? Anton Chuvakin, Ph.D., GCIA, GCIH Security Strategist November 15, 2004
WARNING! This presentation is from 2004. Now in 2008, I might not share all the view expressed in the presentation. It is posted the way it was originally presented in the hopes of being useful for somebody.
Highlights Monitoring and logging overview Log consolidation strategy: which log sources to include first Monitoring and event response strategy Log correlation to automate the monitoring Using logs for forensics and incident response Management and compliance reporting
Definitions Logging Auditing Monitoring Event reporting Log analysis Alerting
Security Data Overview Audit logs Transaction logs Intrusion logs Connection logs System performance records User activity logs Various alerts Firewalls/intrusion prevention Routers/switches Intrusion detection Hosts Business applications Anti-virus VPNs What data? From Where?
Value of Logging and Monitoring Monitoring   Incident detection Loss prevention Compliance Logging Audit Forensics Incident response Compliance Analysis   Deeper insight  Internal attacks Fault prediction
Log Management Process Collect  the data Convert  to a common format Reduce  in size, if possible Transport  securely to a central location Process  in real-time Eliminate  false positives Alert  on threats Store  securely Report  on trends
Log Process Overview
Centralize the Logs! Accessibility All audit records in one place Cross-device  searchability  and  analysis Categorization Correlation De-duplication / volume  reduction Reduced  response   time Increase  in the efficiency of existing security point solutions
Retention Time Question I have the answer!     No, not really. Regulations? Unambiguous: PCI – keep’em for  1 year Tiered retention strategy Online Nearline Offline/tape
Monitoring or Ignoring Logs? How to plan a response strategy to activate when monitoring? Where to start? How to tune it?
Monitoring Strategy
Setting Up Log Monitoring Program Phased approach Security gear to connect   E.g.: DMZ, then core, then other internal systems Log types to integrate E.g.: IDS (with vulnerability data), then firewalls, then hosts, then others Log management components to deploy E.g.: collection, reporting, correlation, incident management, others Growth of user community E.g.: security team, then IT or auditors
Challenges to Deployment Organization  political  boundaries Inherent in any project involving “integration” Data crossing  network and state boundaries Potentially subject to data privacy law Access to  remote  locations where the data sources are Remote management, but not remote installation Custom  applications Unsupported and undocumented log formats Defined and current  escalation trees  for incidents Who would act on the alert?   How is change management handled?
Timing is everything! Timing requirements for analysis Real-time  fallacy: “we have to have it  when?”   Log  review vs  alert  monitoring: different challenges and different timing
“Real-Time” Tasks Malware  outbreaks Convincing and reliable  intrusion  evidence Serious  internal  network abuse Loss  of  service  on critical assets
Daily Tasks Unauthorized configuration changes Disruption in other services Intrusion evidence Suspicious login failures Minor malware activity Activity summary
Weekly Tasks Review inside and perimeter log trends and activities Account creation/removal Other host and network device changes Less critical attack and probe summary
Monthly Tasks Review long-term network and perimeter trends Minor policy violation summary Incident team performance measurements Security technology performance measurements
“On Incident” Tasks Use SANS six-step  incident workflow Review all relevant logs on a central logging system Collect additional logs, if needed
Reporting Operations Reports for Level 1 personnel Analytic Deep analysis reports Management “ Boss pleasers”  
Logs in Support of Compliance Application  and asset risk  measurement Data collection and storage  to satisfy auditing of controls requirements Support for  security metrics Documented  incident resolution procedures Industry  best-practices  for incident management and reporting Proof of security  due diligence Example regulation include:  HI PAA , SOX, GLBA,…
Logs for Forensics What? You think  this  is evidence?  Bua-ha-ha-ha   “ Computer Records and the Federal Rules of Evidence “ “ First , parties may  challenge the authenticity  of both computer-generated and computer-stored records by questioning whether the records were altered, manipulated, or damaged after they were created.  Second , parties may question the authenticity of computer-generated records by  challenging the reliability  of the computer program that generated the records.  Third , parties may challenge the authenticity of computer-stored records by  questioning the identity  of their author.”
Logging Device Highlights  Usage metrics, violations Application Clean status, update failures Anti-virus Failures, crashes, unauthorized Host Attacks, intrusions, probes, abuse NIDS/NIPS Failures, DoS, outbound Firewall
Example: OS Account/group changes Account logins Changes in permissions for critical files/directories Shutdowns Patches/hotfixes Elevated privileges
Example: NIDS and NIPS Intrusion attempts Probes Admin privilege abuse Miscellaneous network anomalies AUP violations
Exception vs Audit? Should I log “normal stuff”? Firewall deny vs allow Resource access Alert vs log  question
Summary Extensive logging is a  must !  You now have some hints on what you should log and how to plan Monitoring helps extract  more  value from logs And its huge! Logging helps with  compliance  and  forensics It might even be mandated and …
Q&A? More information? Anton Chuvakin, Ph.D., GCIA, GCIH, GCFA anton@chuvakin.org  Security Strategist Author of “Security Warrior” (O’Reilly 2004) –  www.securitywarrior.org   My book on logs is coming soon! See  www.info-secure.org  for my papers, books, reviews and other security resources related to logs

More Related Content

PPT
Application Security
PPTX
Introduction to Incident Response Management
PPTX
Best cloud security practices with MITRE ATT&CK
PPTX
Digital forensic tools
PPTX
Identity and Access Management (IAM): Benefits and Best Practices 
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PDF
ATT&CK Updates- Defensive ATT&CK
PDF
Finding attacks with these 6 events
Application Security
Introduction to Incident Response Management
Best cloud security practices with MITRE ATT&CK
Digital forensic tools
Identity and Access Management (IAM): Benefits and Best Practices 
Application Security | Application Security Tutorial | Cyber Security Certifi...
ATT&CK Updates- Defensive ATT&CK
Finding attacks with these 6 events

What's hot (20)

PPTX
Introduction to Cybersecurity Fundamentals
DOCX
Zero-Day Vulnerability and Heuristic Analysis
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PDF
certified-ethical-hacker-cehv12_course_content.pdf
PPTX
CLOUD NATIVE SECURITY
PPTX
Database security
PPTX
Introduction to information security
PPTX
Azure key vault
PPTX
Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...
PPTX
Microsoft Active Directory.pptx
PDF
OWASP Mobile Top 10 Deep-Dive
PPTX
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
PPTX
Logging, monitoring and auditing
PPTX
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
PDF
LinPKI EJBCA : une PKI open source en route vers la certification Critères Co...
PPTX
Crowdstrike .pptx
PPTX
Azure Key Vault - Getting Started
PDF
Réussir son projet de sécurisation des Identités en 5 commandements (parce qu...
PPTX
SOAR and SIEM.pptx
PDF
Threat Modeling Using STRIDE
Introduction to Cybersecurity Fundamentals
Zero-Day Vulnerability and Heuristic Analysis
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
certified-ethical-hacker-cehv12_course_content.pdf
CLOUD NATIVE SECURITY
Database security
Introduction to information security
Azure key vault
Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...
Microsoft Active Directory.pptx
OWASP Mobile Top 10 Deep-Dive
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
Logging, monitoring and auditing
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
LinPKI EJBCA : une PKI open source en route vers la certification Critères Co...
Crowdstrike .pptx
Azure Key Vault - Getting Started
Réussir son projet de sécurisation des Identités en 5 commandements (parce qu...
SOAR and SIEM.pptx
Threat Modeling Using STRIDE
Ad

Similar to What Every Organization Should Log And Monitor (20)

PPT
Logs for Information Assurance and Forensics @ USMA
PPT
FIRST 2006 Full-day Tutorial on Logs for Incident Response
PPT
NIST 800-92 Log Management Guide in the Real World
DOC
Audit logs for Security and Compliance
PDF
PPT
Log Forensics from CEIC 2007
PPTX
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
PPTX
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
PPT
O'Reilly Webinar Five Mistakes Log Analysis
PPTX
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
PPTX
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
PDF
Events Classification in Log Audit
PDF
Securing your IT infrastructure with SOC-NOC collaboration TWP
PDF
UNIT -III SIEM aur baato kaise hai aap log.pdf
DOC
Logging "BrainBox" Short Article
PPT
Logs for Incident Response and Forensics: Key Issues for GOVCERT.NL 2008
PPT
Logs for Incident Response and Forensics: Key Issues for GOVCERT.NL 2008
DOC
Log Management in the Age of Compliance
PPT
Six Mistakes of Log Management 2008
PDF
Understanding the Event Log
Logs for Information Assurance and Forensics @ USMA
FIRST 2006 Full-day Tutorial on Logs for Incident Response
NIST 800-92 Log Management Guide in the Real World
Audit logs for Security and Compliance
Log Forensics from CEIC 2007
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
O'Reilly Webinar Five Mistakes Log Analysis
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Events Classification in Log Audit
Securing your IT infrastructure with SOC-NOC collaboration TWP
UNIT -III SIEM aur baato kaise hai aap log.pdf
Logging "BrainBox" Short Article
Logs for Incident Response and Forensics: Key Issues for GOVCERT.NL 2008
Logs for Incident Response and Forensics: Key Issues for GOVCERT.NL 2008
Log Management in the Age of Compliance
Six Mistakes of Log Management 2008
Understanding the Event Log
Ad

More from Anton Chuvakin (20)

PPTX
SecureWorld 2025 Keynote Déjà Vu All Over Again_ Learning from Cloud's Early...
PPTX
Detection Engineering Maturity - Helping SIEMs Find Their Adulting Skills
PPTX
Future of SOC: More Security, Less Operations
PPTX
SOC Meets Cloud: What Breaks, What Changes, What to Do?
PPTX
Meet the Ghost of SecOps Future by Anton Chuvakin
PPTX
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
PPTX
SOC Lessons from DevOps and SRE by Anton Chuvakin
PPTX
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
PPTX
20 Years of SIEM - SANS Webinar 2022
PPTX
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
PPTX
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
PPTX
SOCstock 2021 The Cloud-native SOC
PPTX
Modern SOC Trends 2020
PPTX
Anton's 2020 SIEM Best and Worst Practices - in Brief
PPTX
Generic siem how_2017
PPTX
Tips on SIEM Ops 2015
PPTX
Five SIEM Futures (2012)
PPTX
RSA 2016 Security Analytics Presentation
PPTX
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
PPTX
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
SecureWorld 2025 Keynote Déjà Vu All Over Again_ Learning from Cloud's Early...
Detection Engineering Maturity - Helping SIEMs Find Their Adulting Skills
Future of SOC: More Security, Less Operations
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Meet the Ghost of SecOps Future by Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SOC Lessons from DevOps and SRE by Anton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
20 Years of SIEM - SANS Webinar 2022
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2021 The Cloud-native SOC
Modern SOC Trends 2020
Anton's 2020 SIEM Best and Worst Practices - in Brief
Generic siem how_2017
Tips on SIEM Ops 2015
Five SIEM Futures (2012)
RSA 2016 Security Analytics Presentation
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
KodekX | Application Modernization Development
PDF
Approach and Philosophy of On baking technology
PPTX
Spectroscopy.pptx food analysis technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Chapter 3 Spatial Domain Image Processing.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
Understanding_Digital_Forensics_Presentation.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Electronic commerce courselecture one. Pdf
Network Security Unit 5.pdf for BCA BBA.
KodekX | Application Modernization Development
Approach and Philosophy of On baking technology
Spectroscopy.pptx food analysis technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

What Every Organization Should Log And Monitor

  • 1. What Every Organization Should Log and Monitor: A Checklist? Anton Chuvakin, Ph.D., GCIA, GCIH Security Strategist November 15, 2004
  • 2. WARNING! This presentation is from 2004. Now in 2008, I might not share all the view expressed in the presentation. It is posted the way it was originally presented in the hopes of being useful for somebody.
  • 3. Highlights Monitoring and logging overview Log consolidation strategy: which log sources to include first Monitoring and event response strategy Log correlation to automate the monitoring Using logs for forensics and incident response Management and compliance reporting
  • 4. Definitions Logging Auditing Monitoring Event reporting Log analysis Alerting
  • 5. Security Data Overview Audit logs Transaction logs Intrusion logs Connection logs System performance records User activity logs Various alerts Firewalls/intrusion prevention Routers/switches Intrusion detection Hosts Business applications Anti-virus VPNs What data? From Where?
  • 6. Value of Logging and Monitoring Monitoring Incident detection Loss prevention Compliance Logging Audit Forensics Incident response Compliance Analysis Deeper insight Internal attacks Fault prediction
  • 7. Log Management Process Collect the data Convert to a common format Reduce in size, if possible Transport securely to a central location Process in real-time Eliminate false positives Alert on threats Store securely Report on trends
  • 9. Centralize the Logs! Accessibility All audit records in one place Cross-device searchability and analysis Categorization Correlation De-duplication / volume reduction Reduced response time Increase in the efficiency of existing security point solutions
  • 10. Retention Time Question I have the answer!  No, not really. Regulations? Unambiguous: PCI – keep’em for 1 year Tiered retention strategy Online Nearline Offline/tape
  • 11. Monitoring or Ignoring Logs? How to plan a response strategy to activate when monitoring? Where to start? How to tune it?
  • 13. Setting Up Log Monitoring Program Phased approach Security gear to connect E.g.: DMZ, then core, then other internal systems Log types to integrate E.g.: IDS (with vulnerability data), then firewalls, then hosts, then others Log management components to deploy E.g.: collection, reporting, correlation, incident management, others Growth of user community E.g.: security team, then IT or auditors
  • 14. Challenges to Deployment Organization political boundaries Inherent in any project involving “integration” Data crossing network and state boundaries Potentially subject to data privacy law Access to remote locations where the data sources are Remote management, but not remote installation Custom applications Unsupported and undocumented log formats Defined and current escalation trees for incidents Who would act on the alert? How is change management handled?
  • 15. Timing is everything! Timing requirements for analysis Real-time fallacy: “we have to have it when?”  Log review vs alert monitoring: different challenges and different timing
  • 16. “Real-Time” Tasks Malware outbreaks Convincing and reliable intrusion evidence Serious internal network abuse Loss of service on critical assets
  • 17. Daily Tasks Unauthorized configuration changes Disruption in other services Intrusion evidence Suspicious login failures Minor malware activity Activity summary
  • 18. Weekly Tasks Review inside and perimeter log trends and activities Account creation/removal Other host and network device changes Less critical attack and probe summary
  • 19. Monthly Tasks Review long-term network and perimeter trends Minor policy violation summary Incident team performance measurements Security technology performance measurements
  • 20. “On Incident” Tasks Use SANS six-step incident workflow Review all relevant logs on a central logging system Collect additional logs, if needed
  • 21. Reporting Operations Reports for Level 1 personnel Analytic Deep analysis reports Management “ Boss pleasers” 
  • 22. Logs in Support of Compliance Application and asset risk measurement Data collection and storage to satisfy auditing of controls requirements Support for security metrics Documented incident resolution procedures Industry best-practices for incident management and reporting Proof of security due diligence Example regulation include: HI PAA , SOX, GLBA,…
  • 23. Logs for Forensics What? You think this is evidence? Bua-ha-ha-ha  “ Computer Records and the Federal Rules of Evidence “ “ First , parties may challenge the authenticity of both computer-generated and computer-stored records by questioning whether the records were altered, manipulated, or damaged after they were created. Second , parties may question the authenticity of computer-generated records by challenging the reliability of the computer program that generated the records. Third , parties may challenge the authenticity of computer-stored records by questioning the identity of their author.”
  • 24. Logging Device Highlights Usage metrics, violations Application Clean status, update failures Anti-virus Failures, crashes, unauthorized Host Attacks, intrusions, probes, abuse NIDS/NIPS Failures, DoS, outbound Firewall
  • 25. Example: OS Account/group changes Account logins Changes in permissions for critical files/directories Shutdowns Patches/hotfixes Elevated privileges
  • 26. Example: NIDS and NIPS Intrusion attempts Probes Admin privilege abuse Miscellaneous network anomalies AUP violations
  • 27. Exception vs Audit? Should I log “normal stuff”? Firewall deny vs allow Resource access Alert vs log question
  • 28. Summary Extensive logging is a must ! You now have some hints on what you should log and how to plan Monitoring helps extract more value from logs And its huge! Logging helps with compliance and forensics It might even be mandated and …
  • 29. Q&A? More information? Anton Chuvakin, Ph.D., GCIA, GCIH, GCFA anton@chuvakin.org Security Strategist Author of “Security Warrior” (O’Reilly 2004) – www.securitywarrior.org My book on logs is coming soon! See www.info-secure.org for my papers, books, reviews and other security resources related to logs

Editor's Notes

  • #2: Note the switch; you log first and monitor second! I am not an auditor – value the security prospective.