Perimeter
6/2/2011
11:47 PM
John H. Sawyer
John H. Sawyer
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Logging Isn't Hard -- Getting Started Is

The biggest hurdle for SMBs with logging is taking the first step

Having performed numerous incident response engagements for small to midsize businesses, the thing that causes never-ending frustration is the lack of logging. There have been a few exceptions where a sysadmin had the foresight to log everything, but more often the IT staff is stretched so thinly that they can't implement something like logging, which doesn't immediately fix some ongoing problem. Instead, they're forced to fight fires that never seem to stop popping up -- and I'm stuck with no more than 30 days of logs to work with.

When things really go south is when those fires IT is fighting are the result of a compromise. What could logs have done at that point? The Verizon Data Breach Incident Report includes some great statistics, one of which says that evidence of a breach was found in the logs in more than half of the cases. That might not seem significant until one realizes that had someone been monitoring those logs, the incident might have been detected early and possibly prevented, saving thousands to millions of dollars.

I've spoken a lot about the importance of regular log monitoring, but it's important to point out that logs have more value beyond preventative and detective capabilities afforded by daily log monitoring. Taking the time to collect the logs also provides a forensic trail that can be invaluable after an incident occurs. An incident responder can leverage the logs to answer the tough questions about how an attacker got in, what systems might have been touched after the initial breach, and whether sensitive data was exfiltrated. But the caveat is that logging has to be enabled, configured properly, and sent to a secure location.

Considering how ridiculously low-cost hard drive storage is, there's no reason why the smallest SMB can't set up a server with a 1- to 2-terabyte hard drive to serve as central collection point. The setup doesn't have to be elaborate: A Linux server running syslog or a Windows server running the free version of Splunk will suffice in the beginning. The most important thing is to start logging so the logs are there when they're needed.

One of the simplest yet most effective solutions I've seen in one environment was a single Linux server logging for approximately 60 desktops and servers. The Windows desktops and servers used Snare to send their logs via syslog to the logging server. The Linux and Mac systems used native syslog functionality to forward their logs to the central server. A firewall configuration on the server only allowed inbound logs and nothing outbound, so all management, including log analysis, was done at the server's console. It wasn't elaborate. It didn't allow for early detection. But, it did provide great value post-compromise during a forensic investigation.

The biggest hurdle to logging is starting. Once that's done, it's just a matter of working in a little time each day to review the logs to help catch problems before they become the stuff data breach headlines are made of.

John Sawyer is a Senior Security Analyst with InGuardians. The views and opinions expressed in this blog are his own and do not represent the views and opinions of his employer. He can be reached at johnhsawyer@gmail.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3541
Published: 2014-07-29
The Repositories component in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via serialized data associated with an add-on.

CVE-2014-3542
Published: 2014-07-29
mod/lti/service.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) is...

Best of the Web
Dark Reading Radio