Auditing
Auditing
Auditing
Computer Forensics
Computer forensics is the science of attempting to
recover evidence on a computer system.
Complex area:
Legal issues heavily weigh in here.
Technical tools are likewise complex, since a chain
of evidence must be preserved.
However, much of this boils down to an area
called auditing. As a result, we must discuss what
audit tools are included (and appropriate) on
various systems.
Table 18.1
Security Audit Terminology
RFC 2828
Anatomy of an audit system
introduction of objects
deletion of objects
distribution or revocation of access rights or capabilities
changes to subject or object security attributes
policy checks performed by the security software
use of access rights to bypass a policy check
use of identification and authentication functions
security-related actions taken by an operator/user
import/export of data from/to removable media
Implementation Guidelines
requirements for
agree on requirements special or additional all access should be
with management processing should be monitored and logged
defined
resources for
performing the checks document procedures,
scope of checks agreed
should be explicitly requirements,
and controlled
identified and made responsibilities
available
remote access
Table
18.2
Auditable
Items
Suggested
in X.816
Monitoring Areas Suggested
in ISO 27002
Figure 18.4 - Examples of Audit Trails
figure 18.4a is an
example of a
system-level audit
trail on a UNIX
system
figure 18.4b is an
example of an
application-level
audit trail for a mail
delivery system
figure 18.4c is an
example of a user-
level audit trail on a
UNIX system
Physical Access Audit Trails
data of interest:
date/time/location/user of access attempt
both valid and invalid access attempts
attempts to add/modify/delete physical access privileges
may send violation messages to personnel
Protecting Audit Trail Data
read/write file on write-once/read-
host many device
• easy, least resource • more secure but less
intensive, instant access convenient
• vulnerable to attack by • need steady supply of
intruder recordable media
• access may be delayed
and not available
immediately
account logon
events
account
privilege use managemen
t
directory
policy
service
changes
access
elements:
API referenced by
command used to configuration file
several standard daemon to
add single-line used to control the
system utilities and receive/route log
entries to the system logging and routing
available to events
log of system log events
application programs
Syslog Service
a means of
capturing relevant
events
extra add-on features may
include:
a storage facility
alternative
robust event log file database
log analysis message rate limiting
filtering response encryption storage
a protocol for formats
transmitting syslog
messages from
other machines to a
central machine
that acts as a
syslog server
Syslog Protocol
a transport allowing hosts to send IP event notification
messages to syslog servers
provides a very general message format
allowing processes and applications to use suitable conventions for
their logged events
vulnerabilities exploited:
lack of dynamic checks on input data
errors in application logic
may be necessary to capture behavior of application
beyond its access to system services and file systems
two approaches to collecting audit data:
interposable libraries
dynamic binary rewriting
Interposable Libraries
loadable modules
can be automatically loaded and unloaded on demand
Audit Trail Analysis
possibilities include:
audit trail review after an event
triggered by event to diagnose cause and remediate
focuses on the audit trail entries that are relevant to the specific
event
periodic review of audit trail data
review bulk data to identify problems and behavior
real-time audit analysis
part of an intrusion detection function
Audit Review
baselining
windowing
correlation
an effective GUI
Suggested
List of
Events
to Be
Audited