Perimeter
6/2/2011
11:47 PM
John H. Sawyer
John H. Sawyer
Commentary
50%
50%

Logging Isn't Hard -- Getting Started Is

The biggest hurdle for SMBs with logging is taking the first step

Having performed numerous incident response engagements for small to midsize businesses, the thing that causes never-ending frustration is the lack of logging. There have been a few exceptions where a sysadmin had the foresight to log everything, but more often the IT staff is stretched so thinly that they can't implement something like logging, which doesn't immediately fix some ongoing problem. Instead, they're forced to fight fires that never seem to stop popping up -- and I'm stuck with no more than 30 days of logs to work with.

When things really go south is when those fires IT is fighting are the result of a compromise. What could logs have done at that point? The Verizon Data Breach Incident Report includes some great statistics, one of which says that evidence of a breach was found in the logs in more than half of the cases. That might not seem significant until one realizes that had someone been monitoring those logs, the incident might have been detected early and possibly prevented, saving thousands to millions of dollars.

I've spoken a lot about the importance of regular log monitoring, but it's important to point out that logs have more value beyond preventative and detective capabilities afforded by daily log monitoring. Taking the time to collect the logs also provides a forensic trail that can be invaluable after an incident occurs. An incident responder can leverage the logs to answer the tough questions about how an attacker got in, what systems might have been touched after the initial breach, and whether sensitive data was exfiltrated. But the caveat is that logging has to be enabled, configured properly, and sent to a secure location.

Considering how ridiculously low-cost hard drive storage is, there's no reason why the smallest SMB can't set up a server with a 1- to 2-terabyte hard drive to serve as central collection point. The setup doesn't have to be elaborate: A Linux server running syslog or a Windows server running the free version of Splunk will suffice in the beginning. The most important thing is to start logging so the logs are there when they're needed.

One of the simplest yet most effective solutions I've seen in one environment was a single Linux server logging for approximately 60 desktops and servers. The Windows desktops and servers used Snare to send their logs via syslog to the logging server. The Linux and Mac systems used native syslog functionality to forward their logs to the central server. A firewall configuration on the server only allowed inbound logs and nothing outbound, so all management, including log analysis, was done at the server's console. It wasn't elaborate. It didn't allow for early detection. But, it did provide great value post-compromise during a forensic investigation.

The biggest hurdle to logging is starting. Once that's done, it's just a matter of working in a little time each day to review the logs to help catch problems before they become the stuff data breach headlines are made of.

John Sawyer is a Senior Security Analyst with InGuardians. The views and opinions expressed in this blog are his own and do not represent the views and opinions of his employer. He can be reached at johnhsawyer@gmail.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7830
Published: 2014-11-24
Cross-site scripting (XSS) vulnerability in mod/feedback/mapcourse.php in the Feedback module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 allows remote authenticated users to inject arbitrary web script or HTML by leveraging the mod/feedback:mapcourse cap...

CVE-2014-7831
Published: 2014-11-24
lib/classes/grades_external.php in Moodle 2.7.x before 2.7.3 does not consider the moodle/grade:viewhidden capability before displaying hidden grades, which allows remote authenticated users to obtain sensitive information by leveraging the student role to access the get_grades web service.

CVE-2014-7832
Published: 2014-11-24
mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by vi...

CVE-2014-7833
Published: 2014-11-24
mod/data/edit.php in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 sets a certain group ID to zero upon a database-entry change, which allows remote authenticated users to obtain sensitive information by accessing the database after an edit by a teacher.

CVE-2014-7834
Published: 2014-11-24
mod/forum/externallib.php in Moodle 2.6.x before 2.6.6 and 2.7.x before 2.7.3 does not verify group permissions, which allows remote authenticated users to access a forum via the forum_get_discussions web service.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?