Lab 7 Implement System Access Control Intrusion Detection
Lab 7 Implement System Access Control Intrusion Detection
Implement and test access control systems to cardholder and sensitive data by business
need to know
Summary:
Exploiting authorized accounts and abusing user privileges is one of the easiest ways for
criminal hackers to gain access to a system. It is also one of the most difficult types of attack to
detect. Documented systems and processes should therefore be put in place to limit access
rights to critical data. Access control systems should deny all access by default, and access
should be granted on a need-to-know basis and according to the clearly defined job
responsibilities of authorized personnel. ‘Need to know’ is defined in the PCI DSS as “when
access rights are granted to only the least amount [sic] of data and privileges needed to perform
a job”.
Contents:
Summary: 1
Contents: 1
Lab Setup: 2
PCI_DSS Mapping: 2
Windows Logs: 3
Common update events: 3
In Kibana: 4
Key Fields for Parsing Updates: 4
Basic Search strings: 5
Policy option we need to confirm: 5
Audit HowTo: 6
Building filter (Type it in): 6
Building filter (Use the Wizard): 7
ToDo: 8
Lab Setup:
Security onion is collecting log data from all of the systems on the network. In this
exercise we will be filtering these logs to confirm compliance with standard windows
updates. We can build filters to search for the installation of specific high risk updates or
search for a more general “Best Practices” policy of installing updates in a timely
manner. For this particular lab we are looking specifically for Windows Update
compliance however with some tuning almost any log file can be imported and parsed by
Kibana. This lab is a more general version of Lab 5. In Lab 5 we were looking
specifically for Windows Defender Definition updates whereas we are now looking for all
required updates. The same techniques we used in Lab 5 are also useful here.
PCI_DSS Mapping:
7.3 Ensure that security policies and operational procedures for restricting access to
cardholder data are documented, in use, and known to all affected parties.
Windows Logs:
[event_id:]
event_id data.EventChannel.System.Message
4656 A handle to an object was requested (open) Can we see a fail here
To fall within this policy guideline only the “Administrator” account has job responsibilities
requiring access to the directories that the critical company data is stored in.
● C:\Users\Public\Documents\CustomerInformation
● C:\Users\Public\Documents\TradeSecrets
To remove the accounts that are supposed to have access and leave just the accounts that
have accessed the file/directory that do not have permission
>_ event_id:4663 AND data.EventChannel.EventData.ObjectName=”file or directory name”
AND NOT data.EventChannel.EventData.SubjectUserName=”allowed username”
Building filter (Use the Wizard):