File Integrity Monitoring Best Practices
File Integrity Monitoring Best Practices
Monitoring Best
Practices
1
Introduction
File integrity monitoring (FIM) is the process of continually monitoring and reporting on any change to your sys-
tem and configuration files. FIM is an essential security control for one simple reason: Any unauthorized or im-
proper change to your system and configuration files could weaken security and indicate that the system has
been compromised. In other words, FIM is vital for two main reasons:
Breach prevention — Security defenses are strongest when all systems maintain the most secure configura-
tion at all times. FIM monitors for any drift from the hardened state.
Breach detection — Changes to files could represent a malware infection or other threat in progress. While
many other security controls (such as antivirus software, next-generation firewalls and SIEM systems) promise
intelligent detection of malware and cyberattacks, they usually leverage known threat profiles or trusted access
rules, which leaves them largely blind to zero-day threats, polymorphous malware, insider attacks and ransom-
ware. FIM, on the other hand, provides comprehensive breach detection because it highlights any potentially
harmful file changes.
This article explains the key best practices that organizations should keep in mind when choosing and implementing
a FIM solution.
Therefore, ensure that the FIM solution you choose is capable of monitoring all system, program, application and
configuration files and directories, across a range of platforms, from the datacenter to the network to the desk-
top, on premises and in the cloud.
At a minimum, a FIM solution must track all file attributes, including file contents, and generate a secure hash
value (at least SHA2) for each file as a ‘DNA fingerprint’ to expose trojan file insertions. Capturing who made each
change is also an essential requirement.
2
FIM must filter out the noise and zero in on
harmful changes
IT ecosystems are highly dynamic. Every minute, documents are being created, log files and database records
are changing, updates and patches are being installed, applications are being installed and enhanced, and much
more.
The vast majority of these changes are normal and legitimate. To avoid overwhelming security teams with a flood
of notifications that result in alert fatigue, a SIM solution must filter out the noise of harmless activity. Specifically,
a FIM solution needs to distinguish between four types of changes:
Approved and good —These are legitimate changes that are executed properly, such as properly applied patches
and additions to audit logs.
Approved but bad — Sometimes people make mistakes. FIM solutions need to be able to recognize when an
approved change was not implemented as anticipated and alert the security team.
Unexpected but harmless — Unplanned changes that are harmless do not require investigation by the secu-
rity team so they need to be filtered out as change noise.
Unexpected and bad —Any change that can’t be correlated with a legitimate cause and that could be malicious
or harmful needs to trigger an immediate alert so it can be promptly investigated and remediated.
ITSM tools like ServiceNow and BMC maintain a record of approved changes that an integrated FIM solution can
use to better assess whether each change it detects was planned and executed properly.
3
SIEM integration provides the context of activity around the changes detected by FIM, facilitating alert triage
and investigation. You may also want to feed all FIM alerts into your SIEM solution as part of your security
operation center (SOC).
4
Baselining capabilities help you quickly establish
strong configurations
State-of-the-art FIM systems can establish a gold-standard baseline configuration from a live system and compare
similar systems to that baseline to ensure consistency.
Similarly, FIM technology can establish standard configurations based on CIS benchmarks or DISA STIG guidance
and audit for any deviations from that baseline to ensure that all systems remain secure.
Instead, it’s important to remember that FIM is listed as a mandatory security control for good reason — it is
vital to strong security. Indeed, FIM helps with all 5 pillars of security described in NIST: Identify, Protect, Detect,
Respond and Recover. Therefore, plan your FIM deployment to improve cybersecurity, and compliance will follow.
5
Conclusion
By following the best practices laid out here, you can dramatically strengthen cybersecurity across your IT ecosys-
tem. Figure 2 provides a convenient summary of the key elements to include in your FIM strategy:
SysWOW65 File
Private Cloud and Container System 32 Reputation
Audit Change SIEM Solutions
e.g. Kuberenetes, Docker, Program Files
and Report
OpenShift Drivers
Compliance
DLLs
with Policy
Hypervisor
e.g. ESX, HyperV, OpenStack
Baseline
Drift
VM / Server
e.g. Windows, Linux, Unix Configuration
Settings
Application and Database Local Securit Policy Planned
Audit Change
e.g. Web applications, User Accounts Installed Change Match
and Report
payment processing, SQL Programs Registry Keys Compliance
Server, Oracle Web Config Files with Policy
Desktop
e.g. Windws, Call Centre,
Developer
CIS or STIG
Confident Data Compliance
Network Infrastructure
e.g. Firewall, VPN Appliance, Card Transaction
router Files Personal
Information Financial Audit Access
Records and Change
Operation Technology (OT)
Industrial Control Systems (ICS)
6
Implement File Integrity Monitoring
to Strengthen Your Security with
Netwrix® Change Tracker
7
About Netwrix
Netwrix® makes data security easy by simplifying how professionals can control sensitive, regulated and business-
critical data, regardless of where it resides. More than 11,500 organizations worldwide rely on Netwrix solutions
to secure sensitive data, realize the full business value of enterprise content, pass compliance audits with less
effort and expense, and increase the productivity of IT teams and knowledge workers.
Founded in 2006, Netwrix has earned more than 150 industry awards and been named to both the Inc. 5000 and
Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S.
Next Steps
See Netwrix products — Check out the full portfolio of Netwrix products: netwrix.com/products
Get a live demo — Take a personalized product tour with a Netwrix expert: netwrix.com/livedemo