Security Audit Logging Guideline | Information Security Office (2024)

Requirement

Resource Custodians must maintain, monitor, and analyze security audit logs for covered devices.

Description of Risk

Without appropriate audit logging, an attacker's activities can go unnoticed, and evidence of whether or not the attack led to a breach can be inconclusive.

Recommendations

Regular log collection is critical to understanding the nature of security incidents during an active investigation and post mortem analysis. Logs are also useful for establishing baselines, identifying operational trends and supporting the organization’s internal investigations, including audit and forensic analysis. In some cases, an effective audit logging program can be the difference between a low impact security incident which is detected before covered data is stolen or a severe data breach where attackers download large volume of covered data over a prolonged period of time.

In the context ofMSSEI, logs are composed of event entries, which capture information related to a specific event that has occurred impacting a covered device. Log events in an audit logging program should at minimum include:

  1. Operating System(OS) Events
    • startupand shutdown of the system
    • start up and down ofa service
    • network connection changes or failures
    • changes to, or attempts to change, system securitysettings and controls
  2. OS Audit Records
    • log on attempts (successful or unsuccessful)
    • the function(s) performed after logged on (e.g., readingor updatingcriticalfile, software installation)
    • account changes (e.g., accountcreation and deletion, account privilege assignment)
    • successful/faileduse of privileged accounts
  3. Application Account Information
    • successful and failed application authentication attempts
    • application account changes (e.g., account creation and deletion, account privilege assignment)
    • use of application privileges
  4. Application operations
    • application startup and shutdown
    • application failures
    • major applicationconfiguration changes
    • application transactions, for example,
      • e-mail servers recording the sender, recipients, subject name, and attachment names for each e-mail
      • Web servers recording each URL requested and the type of response provided bythe server
      • business applications recording which financial records were accessed by each user

Source: NIST SP 800-92, Guide to Computer Security Log Management

The details loggedfor each event may vary widely, but at minimum each event should capture

  • timestamp
  • event, status, and/orerror codes
  • service/command/application name
  • user or system account associated with an event
  • Deviceused (e.g. source and destintation IPs, terminal session ID, web browser, etc)

As an information source that keeps track of important transactions with covered system, audit logs are also a prime target for attackers who are keen to hide their activities to maximize opportunities to compromise targeted data. To prevent attackers from hiding their activities, resource proprietors and custodians must configure strong access control around audit logs to limit the number of user accounts that can modify audit log files. For example, it's common to grant privileges to modify audit log to only the system/application user account, and require any maintenance of audit logs to be performed through the application interface, and not through direct access to operating system console.

If audit logs are transmitted to from one device to another device, e.g. for remote collection, resource proprietors and custodians must also ensure the transmission is secure in accordance to MSSEI encryption in transit requirement.

All covered institutional device should also be configured to use synchronized time sources (i.e. Network Time Protocol - NTP) such that the times on these covered devices are sync to the common time source on a regular basis so that time stamps across all the logs are consistent.

Resource proprietor and custodian must also develop log retention policy to identify storage requirements for covered device logs and appropriate archival procedures to ensure useful log data are available in the case of a response required security incident or investigation. At minimal, the audit logs for the last 30 days must be collected in easily accessible storage media. Older logs should be archived to less expensive storage media, as long as they are still accessible in the future as is required by incidents or investigation.

Due to the complexity of an audit logging program implementation, it is strongly recommended that resource proprietors and resource custodians enroll in the campus-provided audit logging service described below.

Campus Service

The Information Security Office (ISO) has implemented Campus Log Correlation Program, an enterprise grade audit logging software solution (based on HP ArcSight), to aid in managing, correlating, and detecting suspicious activities related to the campus' most critical data assets. This service's advanced detection capabilities enable ISO to correlate events in multiple dimensions - by identity, vulnerability, asset, time, patterns and other events - across firewalls, web servers, system access logs, and other core central Security Services such asVulnerabilityandIntrusion Detectionto determine if a system has been successfully attacked, is currently being probed for attack, or detect advanced threats before they cause damage.

To enroll in ISO Campus Log Correlation Program, please email your request tosecurity@berkeley.edu.

Security Audit Logging Guideline | Information Security Office (2024)
Top Articles
5 preventable reasons pre-approved mortgages get denied | Movement Mortgage Blog
Introduction to Figma Tokens | Ant Design System for Figma
Somboun Asian Market
Urist Mcenforcer
Ffxiv Shelfeye Reaver
Craftsman M230 Lawn Mower Oil Change
Wisconsin Women's Volleyball Team Leaked Pictures
Top Financial Advisors in the U.S.
Erskine Plus Portal
Corpse Bride Soap2Day
Optum Medicare Support
Pbr Wisconsin Baseball
13 The Musical Common Sense Media
Gt Transfer Equivalency
454 Cu In Liters
Turning the System On or Off
7 Low-Carb Foods That Fill You Up - Keto Tips
Pricelinerewardsvisa Com Activate
Indiana Wesleyan Transcripts
Kamzz Llc
FDA Approves Arcutis’ ZORYVE® (roflumilast) Topical Foam, 0.3% for the Treatment of Seborrheic Dermatitis in Individuals Aged 9 Years and Older - Arcutis Biotherapeutics
Finalize Teams Yahoo Fantasy Football
Japanese Mushrooms: 10 Popular Varieties and Simple Recipes - Japan Travel Guide MATCHA
Zillow Group Stock Price | ZG Stock Quote, News, and History | Markets Insider
At&T Outage Today 2022 Map
Jordan Poyer Wiki
kvoa.com | News 4 Tucson
Cornedbeefapproved
Sinai Sdn 2023
How Do Netspend Cards Work?
Kelley Fliehler Wikipedia
Otis Offender Michigan
Stolen Touches Neva Altaj Read Online Free
Www Craigslist Com Shreveport Louisiana
How to Watch the X Trilogy Starring Mia Goth in Chronological Order
Skip The Games Ventura
Arcadia Lesson Plan | Day 4: Crossword Puzzle | GradeSaver
Hindilinks4U Bollywood Action Movies
Temu Y2K
Craigslist Tulsa Ok Farm And Garden
Cranston Sewer Tax
Barstool Sports Gif
412Doctors
Timothy Warren Cobb Obituary
Professors Helpers Abbreviation
Dontrell Nelson - 2016 - Football - University of Memphis Athletics
Copd Active Learning Template
Bonecrusher Upgrade Rs3
The 13 best home gym equipment and machines of 2023
Kidcheck Login
Arnold Swansinger Family
Latest Posts
Article information

Author: Prof. An Powlowski

Last Updated:

Views: 5826

Rating: 4.3 / 5 (44 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Prof. An Powlowski

Birthday: 1992-09-29

Address: Apt. 994 8891 Orval Hill, Brittnyburgh, AZ 41023-0398

Phone: +26417467956738

Job: District Marketing Strategist

Hobby: Embroidery, Bodybuilding, Motor sports, Amateur radio, Wood carving, Whittling, Air sports

Introduction: My name is Prof. An Powlowski, I am a charming, helpful, attractive, good, graceful, thoughtful, vast person who loves writing and wants to share my knowledge and understanding with you.