Perimeter
6/2/2011
11:47 PM
John H. Sawyer
John H. Sawyer
Commentary
50%
50%

Logging Isn't Hard -- Getting Started Is

The biggest hurdle for SMBs with logging is taking the first step

Having performed numerous incident response engagements for small to midsize businesses, the thing that causes never-ending frustration is the lack of logging. There have been a few exceptions where a sysadmin had the foresight to log everything, but more often the IT staff is stretched so thinly that they can't implement something like logging, which doesn't immediately fix some ongoing problem. Instead, they're forced to fight fires that never seem to stop popping up -- and I'm stuck with no more than 30 days of logs to work with.

When things really go south is when those fires IT is fighting are the result of a compromise. What could logs have done at that point? The Verizon Data Breach Incident Report includes some great statistics, one of which says that evidence of a breach was found in the logs in more than half of the cases. That might not seem significant until one realizes that had someone been monitoring those logs, the incident might have been detected early and possibly prevented, saving thousands to millions of dollars.

I've spoken a lot about the importance of regular log monitoring, but it's important to point out that logs have more value beyond preventative and detective capabilities afforded by daily log monitoring. Taking the time to collect the logs also provides a forensic trail that can be invaluable after an incident occurs. An incident responder can leverage the logs to answer the tough questions about how an attacker got in, what systems might have been touched after the initial breach, and whether sensitive data was exfiltrated. But the caveat is that logging has to be enabled, configured properly, and sent to a secure location.

Considering how ridiculously low-cost hard drive storage is, there's no reason why the smallest SMB can't set up a server with a 1- to 2-terabyte hard drive to serve as central collection point. The setup doesn't have to be elaborate: A Linux server running syslog or a Windows server running the free version of Splunk will suffice in the beginning. The most important thing is to start logging so the logs are there when they're needed.

One of the simplest yet most effective solutions I've seen in one environment was a single Linux server logging for approximately 60 desktops and servers. The Windows desktops and servers used Snare to send their logs via syslog to the logging server. The Linux and Mac systems used native syslog functionality to forward their logs to the central server. A firewall configuration on the server only allowed inbound logs and nothing outbound, so all management, including log analysis, was done at the server's console. It wasn't elaborate. It didn't allow for early detection. But, it did provide great value post-compromise during a forensic investigation.

The biggest hurdle to logging is starting. Once that's done, it's just a matter of working in a little time each day to review the logs to help catch problems before they become the stuff data breach headlines are made of.

John Sawyer is a Senior Security Analyst with InGuardians. The views and opinions expressed in this blog are his own and do not represent the views and opinions of his employer. He can be reached at johnhsawyer@gmail.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.