Eric, There are many regs out their that speak generally about taking steps to prove the integrity of logs. (HIPAA, DCID, NISPOM, FFIEC... the list goes on). Some mention log signing as a technique. Many more focus on security of network transmission (i.e. syslog-ng or similar) and controls over access to the log data repository. However, real driver for signing is litigation risk, not regulations. When you present log data as evidence to prosecute intruders, or you are subpoenaed for log evidence, opposing counsel will tend to challenge its integrity on several points: - can't prove that there weren't additional exculpatory records showing someone other than the defendant had the same opportunity, if the evidence is circumstantial, that were then deleted by the _real_ culprit - can't prove the specific events used as evidence weren't changed Signing (with a nonce that can be proven to have been protected) both individual log events and groups of consecutive log events is one of the best ways to address this type of challenge. Furthermore, to the extent that log signing becomes standard practice, a company who does not do it is exposed to civil litigation for not having taken due care, if outsiders, employees, customers, etc. are unable to pursue lawsuits against 3rd parties because of the shakiness of the log evidence. - Christina On Aug 31, 2006, at 1:00 AM, Eric Fitzgerald wrote: > Regarding log signing: is anyone aware of an actual regulatory or > legal requirement for log signing? > > > From: loganalysis-bounces > +ericf=windows.microsoft.com@private on behalf of > Christopher L. Petersen > Sent: Tue 8/22/2006 6:55 AM > To: Patrick Debois; loganalysis@private > Subject: [logs] Re: Log integrity handling on central logsystem > > I've always thought ensuring the integrity of the log begins at > collection and ends at archival. In defining integrity I would say it > means no log entries are altered and the complete log is collected and > centralized. As for best practices, I would recommend the following: > > - Collect all logs as close to real-time as possible. The longer the > source log is on the source host, the more likely it can be altered. > - When possible transport logs with a TCP based protocol and encrypt. > TCP ensures reliability and combined with encryption, makes > altering log > entries as they traverse the network significantly more challenging. > - If UDP Syslog is the only option and the central repository is > across > the WAN, try to collect close to the source and then forward via a TCP > based protocol. > - The central repository should utilize a strong access control > mechanism at the operating system, database, and application layer to > ensure that log data cannot be altered once written. > - Ideally, an archive/backup copy of all centralized logs should be > maintained. This provides redundancy in the event the central log > database fails or becomes corrupt. > - When written to the central repository/archive, additional controls > like hashsums or digital signatures can be used to validate integrity. > If hashsums and/or signatures are used make sure the proper access > controls exist around storing the hashes and signatures to ensure they > cannot be modified. This in itself is another line of thought... > - If you want to get really serious (and spend some money), write > archive copies of the logs to write-once storage. > > I'm not sure if/how Splunk addresses the above. Vendors focused on > log > management (vs SIM) address most if not all of the above. > > Chris Petersen, > CTO & Founder > LogRhythm, Inc. > www.LogRhythm.com > > > -----Original Message----- > > From: loganalysis-bounces+chris=security- > conscious.com@private > > > [mailto:loganalysis-bounces+chris=security- > conscious.com@private > ] > > On Behalf Of Patrick Debois > > Sent: Tuesday, August 22, 2006 12:44 AM > > To: loganalysis@private > > Subject: [logs] Log integrity handling on central logsystem > > > > I'm looking for feedback how centralized log solutions handle data > > integrity; If you would log directly to a central system, that > log is > > the only source. So you would miss something to compare against. > > > > -Would you rely on taking checksums of the logs and storing them on > > another system? > > -How do you protect yourself from the fact that the central > logging is > > compromised with a still growing logfile? > > Would you consider signing each log line? Signing within a text file > is > > fairly easy, but what about content stored in a database? > > > > My customer is currently looking at Splunk. It seems a great way > to go > > through the logfiles, but I'm not sure that we can fullfill his > > dataintegrity requirements with it. But then again it does not stand > in > > the way of another solution doing it probable. > > > > Patrick > > > > > > _______________________________________________ > > LogAnalysis mailing list > > LogAnalysis@private > > http://lists.shmoo.com/mailman/listinfo/loganalysis > _______________________________________________ > LogAnalysis mailing list > LogAnalysis@private > http://lists.shmoo.com/mailman/listinfo/loganalysis > > > _______________________________________________ > LogAnalysis mailing list > LogAnalysis@private > http://lists.shmoo.com/mailman/listinfo/loganalysis _______________________________________________ LogAnalysis mailing list LogAnalysis@private http://lists.shmoo.com/mailman/listinfo/loganalysis
This archive was generated by hypermail 2.1.3 : Thu Aug 31 2006 - 14:29:33 PDT