Security Audit.ppt
《Security Audit.ppt》由会员分享,可在线阅读,更多相关《Security Audit.ppt(31页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、1Security Audit2Security Auditing Definition Audit log Audit procedure Auditor Audit types Audit report Database audit3Definition of Security Audit IS security auditing involves providing independent evaluations of an organizations policies, procedures, standards, measures, and practices for safegua
2、rding electronic information from loss, damage, unintended disclosure, or denial of availability (U.S. Govt. Accounting Office) Method of examining past activities regarding compliance with reference to organizational policies and industry standards Goal is to provide external evidence that organiza
3、tional policies are followed4Definition of Security Audit Helps identify potential vulnerabilities in the system based on audit report Auditors compare the effectiveness of security with respect to industry standards5Audit Log Types of activities/events to log Logins (successful, failure, all, none)
4、 Physical entry (scan card) Changes to system (e.g., permissions) Changes to sensitive data (e.g., salary) Automation of logging Length of retention for logged data One month for login data One week for physical entry data One month for system change data One year for sensitive data6Audit Log Data r
5、etention period must fit organizational goals Data collected must fit organizational culture Identify critical events to trigger immediate notifications to security administrators Numerous accesses to a single file Attempt unauthorized data entries7Audit Log Log only required data (e.g., if age is r
6、equired then do not get address as well) Someone must review logs Logging has a negative effect on system performance Critical events may be overwritten by excessive logging8Audit Log Most OSs allow overwriting log files based on time or file size This choice may be determined by policy, e.g., log f
7、iles must be kept for a certain amount of time Log files can be archived You may need to maintain a (semi-) permanent record of system activity Back up log files before they are overwritten A common method is to alternate two log files, backing up one file while the other is active9Windows Logging W
8、indows uses the Event Viewer as its primary logging mechanism Found in Administrative Tools Event Viewer log files Security log Records security-related events Controlled by a system administrator Typical information includes failed logon attempts and attempts to exceed privileges10Windows Logging A
9、pplication log Records events triggered by application software System administrators have control over what events to store System log Contains events recorded by the operating system System administrator generally has no control over this log Typical events include hardware/software problems Other
10、 specialized log files: directory service log, file replication service log, and DNS server log11Windows Logging Four types of events are stored in Event Viewer logs Error events are created when a serious problem occurs (corruption of a file system) Warning events are created to alert administrator
11、s to potential problems (a disk nearing capacity) Information events are details of some activity that arent indications of a problem (starting or stopping a service) Success/failure auditing events are administrator-defined events that can be logged when they succeed, when they fail, or both (unsuc
12、cessful logon attempts)12UNIX Logging Primary log facility in UNIX is syslog Very flexible, many options for notification and priority Can write to a remote log file allowing the use of dedicated syslog servers to track all activity on a network Syslog priority levels: LOG_EMERG (emergency) LOG_ALER
13、T (require immediate intervention) LOG_CRIT (critical system events) LOG_ERR (error) LOG_WARNING (warn of potential errors) LOG_NOTICE (information, no error)13Configuring Alerts Set up alerts that notify administrators when specific events occur For example, immediate notification if a hard drive i
14、s full Alert options include E-mail, pagers, Short Message Service (SMS), instant messaging, pop-up windows, and cell phones Alerts can be configured differently depending on the severity of the event and the time Only very severe events should trigger a cell phone call in the middle of the night, f
15、or example14Analyzing Log Data Log data is used to monitor your environment Two main activities: Profiling normal behavior to understand typical system behavior at different times and in different parts of your business cycle Detecting anomalies when system activity significantly deviates from the n
16、ormal behavior you have documented15Profiling Normal Behavior A “snapshot” of typical system behavior is called a baseline Baselines can be obtained at the network, system, user, and process level Baselines detail consumption of system resources Baselines will vary significantly based on time of day
17、 or business cycle It is administrators responsibility to determine the baseline studies appropriate for an organization These will change over time 16Detecting Anomalies Define anomalies based on thresholds The following questions must be answered How much of a deviation from the norm represents an
18、 anomaly? How long must the deviation occur before registering an anomaly? What anomalies should trigger immediate alerts? Anomalies can occur at any level For example, if a users behavior deviates from normal, it may indicate a serious security event17Data Reduction When possible, limit the scope o
19、f logging activities to that which can reasonably be analyzed However, regulations or policies may stipulate that aggressive logging is necessary Data reduction tools are useful when more data is collected than can be reviewed Often built into security tools that create log files For example, CheckP
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- Security Audit
限制150内