Log Management - The Foundation For Federal Security and Compliance
Log Management - The Foundation For Federal Security and Compliance
Log Management
The Foundation
for FederalSecurity
andCompliance
White Paper
Table of Contents
Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Log Management Fundamentals. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Practical Applications and Issues: When Vendor Promises Fall Short . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Use case #1SIEM product deployed but with no foundational logging module. . . . . . . . . . . . . . . . . 4
Use case #2Logging search tools: some assembly required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Use case #3The Microsoft Windows host logging quandary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
There Is a Better Way. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
McAfee Enterprise Log Manager for Integrated and Highly Scalable Log Management. . . . . . . . . . . . . . . 6
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
White Paper
Executive Summary
Log aggregation, analysis, storage, and lifecycle management are foundational to any US federal
agencys security and compliance program. But more traditional, manual log management processes
are very labor-intensive, often costly, and dont scale well. Log search tools serve some of the
smaller scale requirements, but those often require both high skill investments and onerous and
escalating licensing costs.
The majority
of responding
organizations are
leveraging security
event data for the
following:
Detecting and
tracking suspicious
behavior.
Supporting forensic
analysis and
correlation.
Achieving/proving
compliance
with regulatory
requirements.
In this paper, we will explore the fundamental requirements for a sound log management solution
and review some examples of less than optimum product deployments. Finally, we will examine
what a US federal agency should be looking for in an extensible log management strategy, and
propose a workable solution for tighter integration into and support of an organizations applicable
and prospective security and compliance programs and initiatives.
Log management has traditionally been the neglected stepchild of information security. Logs can
be perceived as tedious and mundane, especially if there are a lot of repetitive log messages. And
if the logs are regarded as hard to read, or involve a lot of superfluous data, they just may end up in
the proverbial bit bucket. Unfortunately, proprietary logging formats are the norm. Additionally, if
significant logging performance hits are incurred, logging for certain systems (such as databases)
are often turned off completely. Bottom lineif log data isnt actively managed or maintained, it will
often be ignored, disabled, or just sequentially stored away to avoid someone having to deal with it.
Manual log aggregation of servers, network devices, and applications can, and sometimes is, a shortterm remedy to impending security review or compliance audit requirements. But this piecemeal
approach is often surprisingly costly and is only a stopgap measure for a larger and growing set of
federal security and compliance requirements. What is needed is a way to satisfy fundamental log
management requirements in an automated and sustainable manner.
So lets take a look at those fundamental requirements. The log management solution should have
the following capabilities:
Ability to search stored raw data: both structured and unstructured data.
Ability to pinpoint attack source by scouring log data storage pools for alerting and
reporting.
White Paper
bility to take the indexed and normalized log data and conduct activity/event
A
correlation bidirectionally with SIEM, providing security information that can be alerted
and reviewed in near real time.
Ability to produce reports verifying and validating security and compliance posture.
Clearly, all this is far beyond what can be achieved with anything other than an automated log
management system. But while having automated processes built in is a necessary solution
attribute, it is not sufficient for a fully functional log management platform.
In the following section, well take a look at a couple of use cases that illustrate some common
pitfalls that have been experienced by organizations using products being marketed as log
management solutions.
Some queries need to be created manually and could get quite complicated.
Often requires custom application development for use as a larger-scale security event
search tool.
Real-time attack and high event logging occurrences can overwhelm these tools (for
example, a. network attack that generates 100 times the events per second [eps] on
thefirewall).
Dont scale well to large environments.
White Paper
They inevitably involve manual assembly. You must build it yourself, on your own
hardware and operating environments.
One log search vendor even charges by the indexed MB, a data consumption revenue
scheme that becomes increasingly expensive when the operational logging universe
inevitably expands and when re-indexing of data recurs.
White Paper
McAfee Enterprise Log Manager for Integrated and Highly Scalable Log Management
McAfee Enterprise Log Manager automates log management and analysis for all log types, including
Windows event logs, database logs, application logs, and system logs. Logs are signed and validated,
ensuring authenticity and integritya necessity for regulatory compliance. Out-of-the-box
compliance rule sets and reports make it simple to prove your organization is in compliance and
policies are being enforced.
McAfee Enterprise Log Manager collects logs intelligently, storing the right logs for compliance, and
parsing and analyzing those logs for security. You can retain logs in their original format for as long
as you require for specific compliance needs. Since we do not alter the original log files, McAfee
supports chain of custody and non-repudiation efforts.
Collect, sign, and store any log type in its original format for as long as you require to
support your specific compliance and evidentiary needs.
Adapt storage and retention to each log source.
Use easily customizable storage pools to ensure that your logs are stored correctly and
for the right amount of time.
Differentiate logs stored for compliance from logs to be parsed and analyzed for security.
Store logs locally on appliance and/or via storage area network (SAN) or networked
attached storage (NAS).
Get up to 14 TB (uncompressed capacity) of usable HDD storage on the appliances, and
optional fiber channel cards for high-speed SAN storage.
Access original log files and even the specific log record from any point in the event
management processwith only one click.
Leverage use cases.
Provide log management and retention capabilities to support advanced use cases,
including:
Establishing and automating compliant data/log retention.
Establishing non-repudiation of evidence.
Establishing an audit trail for administrator activity.
Establishing an audit trail for user account activity and changes.
Establishing automated reporting.
Log management is tightly integrated with event correlation, situational awareness, advanced
analytics, alerting, and rich reporting capabilities provided by integration with McAfee Enterprise
Security Manager, McAfee ePO software, McAfee Vulnerability Manager, and McAfee Global Threat
Intelligence (McAfee GTI).
White Paper
Using this tightly integrated log collection, management, and analysis environment will both
strengthen your agencys security profile and dramatically improve its ability to comply with more
than 240 standards, mandates, and regulations, such as FISMA, CAESARS, the DHS Continuous
Diagnostics and Mitigation Program, Executive Order 13396: Improving Critical Infrastructure
Cybersecurity, HIPAA/HITECH, NERC-CIP, FedRAMP, PCI-DSS, and GLBA.
McAfee Receiver
Third-Party Log/Event/Flow Collection
and Correlation Engine
AES Encrypted
Channel
Receiver
Receiver
Receiver
McAfee Enterprise
Log Manager
CIFS
NFS
SAN
NAS
iSCSI
GLOBAL THREAT
LANDSCAPE
ENTERPRISE RISK
LANDSCAPE
Vulnerabilities
Immediate alerting
Countermeasures
Historical Analysis
Individuals
Risk
Advisor
ePolicy
Orchestrator
Dynamic Content
Content Aware
Traditional Context
Log Management
Figure 2. McAfee Enterprise Log Manager + McAfee Enterprise Security Manager = Deep investigative capacity, broad event
correlation/visualization, and fast response.
US federal government relevant certifications and validations for McAfee SIEM solutions include:
UC-APL certified.
DITSCAP certified.
White Paper
Summary
While there have been significant advancements in recent years in the area of log management,
there still remain many discrepancies in vendors product claims and their corresponding
implementation realities. Reduced time-to-deployment, simplified usability, increased visualization,
automated time-to-protection, situational awareness, flexible distribution models, and much more
cost-effective solutions are required.
If these are important considerations for your organization, investigate the high-performance, tightly
integrated, and cost-effective log and security management solutions from McAfee.
Awards and related deployment examples:
McAfee ESM Included in $6B DHS Continuous Diagnostics and Mitigation BPA Award.
About McAfee
McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), is the worlds largest
dedicated security technology company. McAfee delivers proactive and proven solutions and
services that help secure systems, networks, and mobile devices around the world, allowing
users to safely connect to the Internet, browse, and shop the web more securely. Backed by its
unrivaled global threat intelligence, McAfee creates innovative products that empower home users,
businesses, the public sector, and service providers by enabling them to prove compliance with
regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and
improve their security. McAfee is relentlessly focused on constantly finding new ways to keep our
customers safe. http://www.mcafee.com
Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other countries. McAfee, the McAfee logo, ePolicy
Orchestrator, and McAfee ePO are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the US and other countries. Other marks
and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and
subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2013 McAfee, Inc.
60560wp_fed-log-mgmt_1013B_ETMG