Audit Log Review and Management Explained | StrongDM (2024)

Audit Log Review and Management Explained | StrongDM (1)

When an information security incident occurs, you need to be able to gather as much information about it as quickly as possible. There’s also a very real possibility that you will have to involve outside parties - such as an incident response team - to help you as well.

This means you can’t approach log management and retention as simple items on a checklist. Instead, you must have rich data captured within audit logs from all critical information systems. Otherwise, your logs will be incomplete, inaccurate, or missing altogether — which doesn’t provide you the historical information you need when cybersecurity questions, concerns, or incidents arise.

Scrambling to gather log data for your incident response team delays your efforts to stop a malicious actor, leaving your systems vulnerable. When it comes to security intelligence, you don’t have time to waste.

🕵 Learn how Coveo gained complete visibility across their entire stack with centralized and granular audit logs and simplified compliance audits.

5 questions to ask when writing your log management and review security policy

Are your event logs complete and accurate?

It’s 10 p.m. - do you know what’s connected to your network? If you have had an IT or security audit in the past, you may have heard a saying similar to, “You cannot protect what you do not know is there.” It may sound simple or silly, but it’s true. There’s no way to know if you are gathering logs from all your endpoints and operating systems unless you complete a comprehensive software and hardware inventory. This is why many security assessment frameworks set this as a high-priority finding. The CIS Critical Security Controls (CSC), for example, put “Inventory and Control of Hardware Assets” as number one on their list.

What should audit logs contain?

It’s not enough to simply be collecting logs. You might be filling terabytes of hard drive space with logs from your intrusion detection system and anti-virus solution as you read this post right now, but you could miss critical information if the security logs don’t capture answers to these questions:

  • What happened? What are the relevant error messages, event IDs, etc. that speak to the security event?
  • What systems are affected? Do logs collect relevant system names and IP addresses?
  • When did it happen? Are all critical security systems, such as your intrusion prevention systems, synchronized with a centralized time source? And is the time zone set appropriately on all endpoints as well?
  • Who was logged in? Are events tied back to a unique user ID?

Although this core information will give you a fighting chance to accurately triage and respond to issues, it’s the “who” question that is of particular importance in the world of SOC 2. This goes beyond just understanding who had access to the system — you also need to know exactly what they were doing at 2pm on December 16th when the system went down. Look at other activities of that individual that might be connected to the incident— and verify which activities were within their access permissions.

This kind of information is at your fingertips when you have a tool that creates comprehensive system log files of:

  • When a new user is provided with a system account
  • When an account has access control granted or suspended, and by whom
  • When an account accesses sensitive information, such as data associated with PCI DSS and HIPAA
  • When an account shows signs of malicious activity, such as deleting large quantities of files or disabling security monitoring software
  • When accounts change roles or permission levels
  • When system administrators/engineers make changes to databases or servers

Audit trail

In addition to collecting the critical logging information, you need the ability to store it in a format that makes sense for auditing purposes. Some companies just turn “logging up to 11” and what they essentially end up with is a gigantic pile of logs. But if someone had to actually search and parse through those logs, it would be a living nightmare. Whatever tools you use to ingest logs need to have advanced searching capabilities. You need to be able to search by key fields and indicators, as well as run reports from a specified timeframe, as these are the kinds of operations, you will be asked to do during an audit.

🔥Hot Tip: Many legacy logging tools use screen recordings to capture logs. Find a tool like StrongDM that records your logs with text search abilities— this will get you to the information you need much faster.

How long should audit logs be kept?

As you might imagine, this amount of real-time log data needs to be retained for a period of time to satisfy audit and/or regulatory requirements. As a general rule, storage of audit logs should include 90 days “hot” (meaning you can actively search/report on them with your tools) and 365 days “cold” (meaning log data you have backed up or archived for long-term storage). Store logs in an encrypted format. See our post on Encryption Policies for more information.

How often should audit logs be reviewed?

Remember that just collecting the logs is not enough. You need to periodically review logs for unusual behavior, which can come from a combination of automatic and manual efforts. Your logging/alerting/correlation system, for example, can be configured as a first-level triage for uncovering unusual behavior. But tools shouldn’t be the be-all, end-all of your log review. You should configure log summary reports that are automatically emailed periodically and then assign resources to review them monthly. During the manual review, you can ensure the log collection endpoints match up with your inventory and configure any new endpoints to generate logs as needed. You can also figure out if one or more log sources are failing to collect for any reason and/or if log disk space for the next month will be sufficient.

It’s also a good idea to schedule regular simulations of events to make sure the proper logs are generated. For instance, you could create a test account on the network, adjust its rights and permissions, and then log into it with the wrong password enough times to force a lockout. Ensure that logs were generated for each of these key events, and gave you enough information to answer the questions above.

Many organizations have no idea what’s going on “under the hood” of their networks, and in the case of a breach or other security incident, they would have little evidence to help them figure out what happened. Turning up logging from your network endpoints is a great first step, but you also need to tune the logs so they provide you with insightful information. Make sure you have carefully planned for storing these logs for both the short and long term. Finally, be sure that you don’t rely solely on your tools to shoulder the logging burden for you. Schedule regular manual reviews to make sure all critical endpoints are being logged and generate the level of detail that you define in your log management and review policy.

Why are audit logs important?

First reason: Legal Requirements

Some regulated environments require that access and action on a database be tracked.

The image below is a capture of version 3.2.1 of the PCI DSS standard:

Audit Log Review and Management Explained | StrongDM (2)

✨ Stay on Top of It: The requirements for PCI compliance are dependent on the number of transactions your business processes, which means the difficulty of maintaining compliance grows as you grow. Download our PCI Compliance Checklist to make sure you don’t fall behind.

For health data, the Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identifiable Health Information is a bit less prescriptive, but the obligation results in a good audition system in place:

“Persons and entities should take reasonable steps to ensure that individually identifiable health information is complete, accurate, and up-to-date to the extent necessary for the person’s or entity’s intended purposes and has not been altered or destroyed in an unauthorized manner.”

This one is interesting because it brings up an important reason to audit your system queries: ensuring data integrity. It would be easy to assume that data is safe if access is restricted to staff in clearly defined roles. After all, you only hire professional and trustworthy people.

But in this day and age, it’s critical to take this a step further — trust but verify. This requires that you collect forensic evidence. If someone claims their data has been improperly accessed or tampered with, you need a proper log management solution to prove their claim is false. To do that, your system must log every action, not just the security logs. For example, application logs and operating system logs may contain security-related information as well as log messages about events that may not initially appear security-related. The potential value of different sources and log events must be considered. Furthermore, it’s not sufficient that log entries demonstrate the following:

  • access to applications, databases, or servers is restricted to specific people or roles
  • only these staff had sessions on a given day
  • these commands were executed but by a shared credential, so there is no clear authorship

Your log management setup needs to provide for all three to answer who did what, where, and when.

Second Reason: Data Integrity

Ensuring data integrity means doing a lot of things, A LOT! This doesn’t just mean you have to backup data and set proper access control to prove it hasn’t been tampered with. You also need to track all changes to records to demonstrate that nothing was modified post ingestion from an external data source (client input, as form, mail, or upload, for example).

You must be able to prove that no system administrator or developer has modified the data from the original input. To do that log analysis, you need to log data from both human and machine interactions.

When humans interact with data, sometimes that occurs in your application. In those cases, activities should be tracked in the application logs themselves. Other times, humans might query a database or ssh to a web server containing sensitive data. In those cases, you will need another approach to log information from those sessions, queries, and commands.

We can all agree that in an ideal world, no one would access the DB, and all changes would run through a deployment pipeline and be subject to version control. In reality, that is not always true. Sometimes just finding what went wrong in code implies connecting to the database to investigate. Without a record of the queries during that session, you would be unable to prove what that developer did.

Third Reason: Forensic analysis

This is the most important reason to create audit logs, especially for databases and servers. While most engineering teams claim to do “blameless postmortems,” it is impossible to conduct a postmortem without an event log of who issued each query. That way, you know what happened and how to roll back.

One way to achieve that is to force all developers to query through an IDE or SQL interface. However, what is missing is a code error from an ORM framework on a developer workstation. This kind of generated queries are hard to guess from the object code and can prove to be a headache to reverse engineer to fix a casual error where the workstation has used the production DB instead of QA, or just because a fixed code had an oversight side effect when correcting a bug, there are too many cases to name them all and the usual quote “If it can happen, it will happen, the question is When?” Then you must ask, “when it happens, how do you plan to recover.”

Some version of these problems occurs pretty regularly. Sometimes the answer is just to restore, even if it includes sensitive data loss. In the best case, this leads to a useful postmortem, as Gitlab has done a few years back.

Fourth Reason: Because You Can 🙂

Now I know we all should follow log management best practices, but my mother also said I should eat spinach (spoiler alert, I did not). Why? Because best practices are hard. I’ve insisted that queries & ssh commands should be logged because they’re simpler to argue about. But the list of important commands goes well beyond these two. It also includes your system settings. For example, tinkering with the system clock or configuration could cause a fair amount of problems as well.

There are several ways to create that audit trail, including:

  • creating a bastion host
  • enabling database logs (See more about PostgreSQLlogging best practices)

These DIY approaches take some work to build and maintain, but they’ll do the trick. If you have the budget, try StrongDM. StrongDM eliminates the PAM and VPN hell with a protocol-aware proxy that secures access to any database, Linux or Windows server, k8s, or internal web application.

From my experience, StrongDM provides a straightforward and secure approach to gateway audit systems. It doesn’t solve all problems, of course, but it does a good job covering the bases I mentioned above with JSON logs that are easy to parse and consolidate. Another benefit to logging via StrongDM is that they allow you to identify long-running queries which may have impacted application performance. Once you’ve figured out the queries causing performance degradation, you can refactor them to be more effective or schedule them in a low activity timespan.

💡Make it Easy: With StrongDM’s report library, you can see exactly who is doing what, when they are doing it, and where it is being done. This is a huge time saver when completing audits — you won’t even break a sweat. This also enables you to execute internal audit checks more frequently so you can catch security issues earlier (and finally finish work before 5pm). Get a refresher on the StrongDM report library here.

There are also other benefits to using StrongDM. Using it to secure user access gets you not only comprehensive log files but one-click user onboarding and offboarding, audit of access permissions at any point in time, real-time streams of queries in the web UI, and fully replayable server and k8s sessions. It’s a comprehensive suite of tools to manage access to your internal resources.

Try StrongDM with a free 14-day trial.

To learn more about how StrongDM helps companies with auditing, make sure to check out the Auditing Use Case.

About the Author

Brian Johnson, Security Engineer / Podcaster, is the president of 7 Minute Security, an information security consultancy in the Minneapolis area. Brian spends most of his days helping companies defend their networks.

Since 2004, Brian has also run the blog/podcast called 7 Minute Security, where he shares what he has learned about information security into short, 7-minute chunks.

Audit Log Review and Management Explained | StrongDM (3)

💙 this post?

Then get all that StrongDM goodness, right in your inbox.

Audit Log Review and Management Explained | StrongDM (2024)

FAQs

How do you audit log management? ›

Retention of logs is also critical in case a follow-up investigation is required or if an attack remained undetected for a long period of time.
  1. 8.1: Establish and Maintain an Audit Log Management Process.
  2. 8.2: Collect Audit Logs.
  3. 8.3: Ensure Adequate Audit Log Storage.
  4. 8.4: Standardize Time Synchronization.

What is audit log review? ›

Reviewing audit logs allows security teams to detect brute-force attacks, unauthorized access attempts, and other potential threats. Accountability: Audit logs record user activities, providing evidence that shows who did what and when.

What is the audit log summary? ›

They are primarily used for compliance, security, and computer forensic investigations. Audit logs track user actions and system changes to ensure accountability and traceability. They provide a chronological record of activities, crucial for audits and compliance checks.

What is the difference between audit log and log? ›

Whereas regular system logs are designed to help developers troubleshoot errors, audit logs help organizations document a historical record of activity for compliance purposes and other business policy enforcement.

What are the two types of audit logs? ›

Types of Audit Logs

Application Audit Logs: These logs capture events and activities performed by applications, including database queries, transactions, and file operations. Network Audit Logs: These logs capture network events and activities, including network traffic, firewall activity, and access control lists.

What is the purpose of log review? ›

One of the primary benefits of log analysis is related to security. By regularly analyzing logs, you can identify unusual activities that could signal a potential security threat. For instance, multiple failed login attempts from a single IP address could indicate a brute force attack.

How often should you review audit logs? ›

Organizations often follow a combination of scheduled and event-triggered audit log reviews. For example, regularly scheduled reviews could occur daily, weekly, monthly or quarterly, depending on the organization's needs or as specified by compliance regulations.

What should be logged in an audit log? ›

Log events in an audit logging program should at minimum include:
  1. Operating System(OS) Events. start up and shut down of the system. ...
  2. OS Audit Records. log on attempts (successful or unsuccessful) ...
  3. Application Account Information. successful and failed application authentication attempts. ...
  4. Application operations.

Why do I need an audit log? ›

Audit logs track user activity, assist in troubleshooting, verify system security, and ensure compliance with regulatory requirements. They are essentially a form of evidence providing details about when, where, and by whom a specific action was carried out inside a system.

How do I check audit logs? ›

View audit log reports
  1. Click Settings. ...
  2. Click Audit log reports in the Site Collection Administration section.
  3. Select the report that you want, such as Deletion on the View Auditing Reports page, .
  4. Type a URL or Browse to the library where you want to save the report and then click OK.

What is audit log manipulation? ›

Learn about the Audit Tampering Audit Log Manipulation scenario. The Audit Log Manipulation scenario describes when someone with elevated access or a deep understanding of organizational security and infrastructure tampers with audit logs to prevent people from detecting their malicious activity.

What is another name for audit log? ›

An audit trail (also called audit log) is a security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, event, or device.

What are the disadvantages of audit logs? ›

Disadvantages of Audit
  • Expensive: This process puts a heavy monetary cost on a firm for execution. ...
  • Not Suitable for Small Businesses: ...
  • Chances of Uncertainty in the Report: ...
  • Lack of Certainty in Standards: ...
  • Lack of Participation: ...
  • Ignorance of Technology: ...
  • Less Guaranteed:

How long should audit logs be kept? ›

For example, you may keep audit logs and firewall logs for two months. However, if your organization must follow strict laws and regulations, you may keep the most critical logs anywhere between six months and seven years. This timeframe is the log retention period.

How do you audit records management? ›

How records audits are conducted in 4 steps (and our tips for being prepared)
  1. The auditor requests a list of records to review. ...
  2. The auditor reviews your records in detail. ...
  3. The auditor produces an audit report. ...
  4. The auditor may recommend additional audits.
Jun 3, 2021

How do you audit user access management? ›

6 Steps Involved in User Access Management Audit Process
  1. Defining audit objectives. ...
  2. Identifying key stakeholders. ...
  3. Assessing your current UAM policies. ...
  4. Conducting user access reviews. ...
  5. Identifying gaps and vulnerabilities. ...
  6. Implementing necessary changes and improvements.

How do you audit event logs? ›

Open Event Viewer. In the console tree, expand Windows Logs, and then click Security. The results pane lists individual security events. If you want to see more details about a specific event, in the results pane, click the event.

How do you write audit logs? ›

A good audit logging system should not only record event data but also consider various usability criteria for the teams inspecting the logs (i.e the end users) and engineers of the system itself: Immutable: Users of the system should only have the ability to read data from it and not write to it.

Top Articles
Lake Anna Civic Association - The Golden Rule of Boating Etiquette: Do to others as you would have them do to you!
6 things to do with your money before having a baby
neither of the twins was arrested,传说中的800句记7000词
craigslist: kenosha-racine jobs, apartments, for sale, services, community, and events
Tesla Supercharger La Crosse Photos
Math Playground Protractor
From Algeria to Uzbekistan-These Are the Top Baby Names Around the World
Hallowed Sepulchre Instances & More
World of White Sturgeon Caviar: Origins, Taste & Culinary Uses
Craigslist Estate Sales Tucson
Slmd Skincare Appointment
Cincinnati Bearcats roll to 66-13 win over Eastern Kentucky in season-opener
Rapv Springfield Ma
Watch TV shows online - JustWatch
Marion County Wv Tax Maps
Gma Deals And Steals Today 2022
What Happened To Anna Citron Lansky
Justified Official Series Trailer
Cyndaquil Gen 4 Learnset
Odfl4Us Driver Login
Missouri Highway Patrol Crash
St. Petersburg, FL - Bombay. Meet Malia a Pet for Adoption - AdoptaPet.com
/Www.usps.com/International/Passports.htm
Accident On 215
Titanic Soap2Day
Hdmovie2 Sbs
Nesb Routing Number
Inkwell, pen rests and nib boxes made of pewter, glass and porcelain.
Craigslist/Phx
Hermann Memorial Urgent Care Near Me
Enjoy4Fun Uno
Streameast.xy2
Oriellys Tooele
Citibank Branch Locations In Orlando Florida
The best bagels in NYC, according to a New Yorker
The Realreal Temporary Closure
Unblocked Games Gun Games
Mbfs Com Login
Craigslist Rooms For Rent In San Fernando Valley
Autozone Battery Hold Down
Copd Active Learning Template
Crigslist Tucson
855-539-4712
Stoughton Commuter Rail Schedule
Nurses May Be Entitled to Overtime Despite Yearly Salary
Enjoy Piggie Pie Crossword Clue
Solving Quadratics All Methods Worksheet Answers
Peugeot-dealer Hedin Automotive: alles onder één dak | Hedin
Appsanywhere Mst
Ark Silica Pearls Gfi
Latest Posts
Article information

Author: Rubie Ullrich

Last Updated:

Views: 6359

Rating: 4.1 / 5 (52 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Rubie Ullrich

Birthday: 1998-02-02

Address: 743 Stoltenberg Center, Genovevaville, NJ 59925-3119

Phone: +2202978377583

Job: Administration Engineer

Hobby: Surfing, Sailing, Listening to music, Web surfing, Kitesurfing, Geocaching, Backpacking

Introduction: My name is Rubie Ullrich, I am a enthusiastic, perfect, tender, vivacious, talented, famous, delightful person who loves writing and wants to share my knowledge and understanding with you.