Security Audit Logging Guideline | Information Security Office (2024)

Requirement

Resource Custodians must maintain, monitor, and analyze security audit logs for covered devices.

Description of Risk

Without appropriate audit logging, an attacker's activities can go unnoticed, and evidence of whether or not the attack led to a breach can be inconclusive.

Recommendations

Regular log collection is critical to understanding the nature of security incidents during an active investigation and post mortem analysis. Logs are also useful for establishing baselines, identifying operational trends and supporting the organization’s internal investigations, including audit and forensic analysis. In some cases, an effective audit logging program can be the difference between a low impact security incident which is detected before covered data is stolen or a severe data breach where attackers download large volume of covered data over a prolonged period of time.

In the context ofMSSEI, logs are composed of event entries, which capture information related to a specific event that has occurred impacting a covered device. Log events in an audit logging program should at minimum include:

  1. Operating System(OS) Events
    • startupand shutdown of the system
    • start up and down ofa service
    • network connection changes or failures
    • changes to, or attempts to change, system securitysettings and controls
  2. OS Audit Records
    • log on attempts (successful or unsuccessful)
    • the function(s) performed after logged on (e.g., readingor updatingcriticalfile, software installation)
    • account changes (e.g., accountcreation and deletion, account privilege assignment)
    • successful/faileduse of privileged accounts
  3. Application Account Information
    • successful and failed application authentication attempts
    • application account changes (e.g., account creation and deletion, account privilege assignment)
    • use of application privileges
  4. Application operations
    • application startup and shutdown
    • application failures
    • major applicationconfiguration changes
    • application transactions, for example,
      • e-mail servers recording the sender, recipients, subject name, and attachment names for each e-mail
      • Web servers recording each URL requested and the type of response provided bythe server
      • business applications recording which financial records were accessed by each user

Source: NIST SP 800-92, Guide to Computer Security Log Management

The details loggedfor each event may vary widely, but at minimum each event should capture

  • timestamp
  • event, status, and/orerror codes
  • service/command/application name
  • user or system account associated with an event
  • Deviceused (e.g. source and destintation IPs, terminal session ID, web browser, etc)

As an information source that keeps track of important transactions with covered system, audit logs are also a prime target for attackers who are keen to hide their activities to maximize opportunities to compromise targeted data. To prevent attackers from hiding their activities, resource proprietors and custodians must configure strong access control around audit logs to limit the number of user accounts that can modify audit log files. For example, it's common to grant privileges to modify audit log to only the system/application user account, and require any maintenance of audit logs to be performed through the application interface, and not through direct access to operating system console.

If audit logs are transmitted to from one device to another device, e.g. for remote collection, resource proprietors and custodians must also ensure the transmission is secure in accordance to MSSEI encryption in transit requirement.

All covered institutional device should also be configured to use synchronized time sources (i.e. Network Time Protocol - NTP) such that the times on these covered devices are sync to the common time source on a regular basis so that time stamps across all the logs are consistent.

Resource proprietor and custodian must also develop log retention policy to identify storage requirements for covered device logs and appropriate archival procedures to ensure useful log data are available in the case of a response required security incident or investigation. At minimal, the audit logs for the last 30 days must be collected in easily accessible storage media. Older logs should be archived to less expensive storage media, as long as they are still accessible in the future as is required by incidents or investigation.

Due to the complexity of an audit logging program implementation, it is strongly recommended that resource proprietors and resource custodians enroll in the campus-provided audit logging service described below.

Campus Service

The Information Security Office (ISO) has implemented Campus Log Correlation Program, an enterprise grade audit logging software solution (based on HP ArcSight), to aid in managing, correlating, and detecting suspicious activities related to the campus' most critical data assets. This service's advanced detection capabilities enable ISO to correlate events in multiple dimensions - by identity, vulnerability, asset, time, patterns and other events - across firewalls, web servers, system access logs, and other core central Security Services such asVulnerabilityandIntrusion Detectionto determine if a system has been successfully attacked, is currently being probed for attack, or detect advanced threats before they cause damage.

To enroll in ISO Campus Log Correlation Program, please email your request to[email protected].

Security Audit Logging Guideline | Information Security Office (2024)
Top Articles
6 Tactics to Build a Thriving Business | ZenBusiness Inc.
Infinity Dragon
Ffxiv Act Plugin
Moon Stone Pokemon Heart Gold
Kansas City Kansas Public Schools Educational Audiology Externship in Kansas City, KS for KCK public Schools
Cash4Life Maryland Winning Numbers
Overnight Cleaner Jobs
Hertz Car Rental Partnership | Uber
Craigslist Cars And Trucks Buffalo Ny
Unraveling The Mystery: Does Breckie Hill Have A Boyfriend?
Displays settings on Mac
Roblox Character Added
Nieuwe en jong gebruikte campers
123 Movies Babylon
Aita Autism
18443168434
My.doculivery.com/Crowncork
Https E24 Ultipro Com
Craigslist Blackshear Ga
Clear Fork Progress Book
Yakimacraigslist
Why Is 365 Market Troy Mi On My Bank Statement
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Living Shard Calamity
Mals Crazy Crab
City Of Durham Recycling Schedule
Milwaukee Nickname Crossword Clue
Mta Bus Forums
Cornedbeefapproved
Aes Salt Lake City Showdown
Jazz Total Detox Reviews 2022
Stephanie Bowe Downey Ca
Kleinerer: in Sinntal | markt.de
Poe T4 Aisling
Pfcu Chestnut Street
Max 80 Orl
About | Swan Medical Group
How to Get Into UCLA: Admissions Stats + Tips
Help with your flower delivery - Don's Florist & Gift Inc.
Today's Final Jeopardy Clue
Finland’s Satanic Warmaster’s Werwolf Discusses His Projects
The Minneapolis Journal from Minneapolis, Minnesota
What Is Kik and Why Do Teenagers Love It?
Gvod 6014
Craigslist Boats Dallas
13 Fun & Best Things to Do in Hurricane, Utah
Candise Yang Acupuncture
Joblink Maine
The 5 Types of Intimacy Every Healthy Relationship Needs | All Points North
Kidcheck Login
Metra Union Pacific West Schedule
Craigslist Yard Sales In Murrells Inlet
Latest Posts
Article information

Author: Prof. An Powlowski

Last Updated:

Views: 5826

Rating: 4.3 / 5 (44 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Prof. An Powlowski

Birthday: 1992-09-29

Address: Apt. 994 8891 Orval Hill, Brittnyburgh, AZ 41023-0398

Phone: +26417467956738

Job: District Marketing Strategist

Hobby: Embroidery, Bodybuilding, Motor sports, Amateur radio, Wood carving, Whittling, Air sports

Introduction: My name is Prof. An Powlowski, I am a charming, helpful, attractive, good, graceful, thoughtful, vast person who loves writing and wants to share my knowledge and understanding with you.