08 - SIM and Log Aggregation
08 - SIM and Log Aggregation
Incident Response
Logs
• Logs are key to knowing what’s happening on your network
Even attackers will leave tracks
Incident Response
DNS application logs
Web server logs
Proxy logs
Email mailbox access logs
2
Configure logging
• Default logging levels are not always sufficient
Sometimes no logging is default
• Be sure to check with your vendor
• Probably don’t need debug logging
• Pay attention to storage space!
Lots of heavy logs will fill drives fast
Lots of logs might not actually be useful
Incident Response
• Analyze the usefulness of the log
3
Analyzing Logs
• Manual log review
Easy, no special tools required
Impossible to do at scale
• Filtering logs
Show a list of bad, ignore the good
Easy to interpret the results
Doesn’t catch everything
• Summary analysis
Top 10 users, most connections by IP address
Incident Response
Reduces the data, useful for reporting
Loss of information to summarization
4
Analyzing Logs
• Visualization
Easy to spot patterns
Great to show off
Not super useful for getting the details of an event
• Search analysis
Easy to understand
But what exactly should you search for?
• Correlation
Rule-based algorithms
Automated
Incident Response
Fine tuning and writing by experts required
• Log mining
Extract meaning from raw data
Automated
5
But still early in research
How logs help an IR
• Preparation
Verify controls, collect a normal baseline, etc.
• Identification
Detect and confirm an incident
• Containment
Scope the incident, find what else was lost
• Eradication
Preserve logs for the future, confirm backups are safe
• Recovery
Incident Response
Confirm restoration
• Lessons Learned
Logs available for training, as well as preventing a future attack
6
SANS top 6 log categories
• These can best show when suspicious activity is occurring
• Change Reports
Incident Response
• Critical Errors and Failures Reports
7
Authentication and Authorization Reports
• What is it?
Successful and failed attempts to access a system
Specific privileged user activities
Incident Response
Privileged account access
Multiple login failures
Followed by success of that same account
8
Example
• What’s wrong with this?
Incident Response
9
Change Reports
• What is it?
Changes to configuration files
Changes to accounts
Changes to sensitive components of the system
Incident Response
New services installed
Change in file permissions
10
Example
• What’s wrong with this?
Incident Response
11
Network Activity Reports
• What is it?
Network activities that need to be tracked for regulatory compliance
Potentially dangerous network activities
Who is talking to who, how much bandwidth, what port/protocol, etc.
Incident Response
Largest file transfers, inbound or outbound
File uploads to external sites
VPN activity and usage
12
Example
• What’s wrong with this?
Incident Response
13
Resource Access Reports
• What is it?
Access of system, application, and database resources
Activity audit, incident detection
Incident Response
DELETE queries executed on a database
Systems sending mail, excluding known mail servers
14
Example
• What’s wrong with this?
• File Access
Incident Response
15
Malware Activity Reports
• What is it?
Summarize various activities and events likely related to malicious software
Incident Response
16
Example
• What’s wrong with this?
Incident Response
17
Critical Errors and Failures
• What is it?
Significant system errors and failure indicators
Often are security related events
Incident Response
System crashes, shutdowns, restarts
18
Example
Incident Response
19
So those are some examples on how
logs can be useful.
Incident Response
Two major techniques…
20
Signature Detection
• Detect known threats • Signature Examples
Incident Response
• Ports Attacker can use a different
port
• IP Addresses
• Other Artifacts
21
Anomaly Detection
• Detect threats based on non- • Anomaly Examples
standard activities
Incident Response
• Behaviors We expect to see encrypted
traffic on ports 443, 22, etc.
• Ports
Seeing that traffic on, for
• Protocol Analysis example, port 80, would be
anomalous. Malicious? Maybe.
• Other Artifacts
22
So many logs
• Logs are extremely useful – essential to a good security monitoring program
Incident Response
23
SIM, SEM, SIEM
• All are tools that collect information used to analyze the security of the network
Incident Response
Combination of the above two
Raw information from logs
Security events
24
They are quite similar
• All really started with SIM tools
Start collecting logs from various systems
Often helps meet compliance requirements
• SIEM combines this – most products today should have the combined
capabilities
Incident Response
• Very few folks draw a distinction between these anymore – basically the same
25
Capabilities
• Data Aggregation • Compliance
Consolidates logs from many sources Produce reports from log data for
compliance requirements
• Correlation
Uses common attributes to link events • Retention
together
Long-term storage for forensic
Turns raw data into more useful investigations and possible compliance
information requirements
• Alerting
• Forensic Analysis
Automated analysis of raw data produces
actionable alerts Ability to search across different nodes
and time periods.
Incident Response
• Dashboards
Turns data into useful charts
Easier to see patterns or anomalies in
data
26
Plenty of options
• Lots of vendors in the market
• Orgs should evaluate products and make selections based on their needs
Which features from the previous slide are 100% necessary?
Price
Learning curve
Quantity of data and server requirements
Incident Response
Winds, Trustwave…
27
Graylog
• Open source log management
• Scalability
Can bring in logs from multiple tools from multiple systems
Terabytes of data
• Alerting capabilities
Incident Response
• Pre-configured appliance for testing
28
Lab
• Graylog VM – just the pre-configured appliance for testing
• NXLog
Open source log forwarder
Used for forwarding to various aggregation solutions
• Windows machine
Security log
Sysmon
Incident Response
• Let’s jump in to get familiar
29