Docstoc

IT Defense Database Logs D3

Document Sample
IT Defense Database Logs D3 Powered By Docstoc
					The Underutilized Security Bulwark: Database Logs

Dr. Anton Chuvakin

WRITTEN: 2007

DISCLAIMER:
Security is a rapidly changing field of human endeavor. Threats we face literally change
every day; moreover, many security professionals consider the rate of change to be
accelerating. On top of that, to be able to stay in touch with such ever-changing reality,
one has to evolve with the space as well. Thus, even though I hope that this document
will be useful for to my readers, please keep in mind that is was possibly written years
ago. Also, keep in mind that some of the URL might have gone 404, please Google
around.


        As security breaches like that of TJ Maxx grab headlines and as corporate
regulations like Sarbanes-Oxley and PCI continue to emphasize preserving and securing
data and assurance of IT controls, organizations are increasingly turning to log data to
provide a continuous fingerprint of everything that happens within the security perimeter.
Enterprises look to logs from network systems (routers, switches, firewalls), security
devices (IDS/IPS, firewalls), and/or servers (Windows, Unix, Linux, and even
mainframes) to gain insight into their system, protect from internal and external security
threats, and satisfy auditors. However, another crucial, log-generating part of the IT
infrastructure, the database, has been capturing more attention recently, even though most
security issues surrounding databases have existed since commercial database systems
were introduced a few decades ago.

        Over the past few years, insider attacks have caused more headaches than
occasional malware-related incidents. According to recent surveys, a majority of
respondents attribute at least some amount of data loss to insiders. Perhaps the top reason
why paying attention to database security is crucial to improving enterprise information
security posture is that database systems are deployed deep inside the company network.
This is also why databases are less visible on a security radar—their internal deployment
is seen as a shield that protects them from Internet attacks. However, such database
placement makes them a prime target for insiders, who have the best opportunity to
attack, compromise, and steal the data. Although, it is not just insider threats that present
problems. Databases that house confidential client information (e.g. medical records or
credit card numbers) that need to be available to partners and other outside parties can
also be penetrated by outsiders, possibly through web application vulnerabilities. Such a
breach is guaranteed to have deleterious effects. The term “database security” connotes
controlling access to database software, structures (or “metadata”), the data itself,
database configuration hardening, database data encryption, and database vulnerability
scanning, all of which are underscored by database logging, which stands as the last but
most critical line of defense against insider attacks as well as compliance risks.
Database Logging is Difficult…

        Databases offer different arrays of logging options, but most are capable of
logging user logins and logouts, database system starts, stops, restarts, various system
failures and errors, user privilege changes, database structure changes, database
administrator actions, and database data access. These logged events provide deep
insight into the IT infrastructure and business data- insight that can help enterprises meet
their security, compliance, and IT operational needs. The question then becomes if
databases offer extensive logs that are crucial for accurate and effective user-activity
tracking and/or preventing insider attacks, why do database logs remain the forgotten
children of the log family?

         There are several reasons that database log management and analysis does not
happen to the extent that it should. First, it is inherently complicated—the logs
themselves are unclear and often difficult to analyze; many databases log in multi-line
format, where a single record might be spread across multiple lines of log data. In
addition, all but the most basic database logging capabilities are typically turned “off” by
default, however shocking that sounds in today’s compliance-heavy environment. To
enable proper database logging, a database administrator (DBA) must set special
configuration options or sometimes restart the database software, both of which take
time, manpower, and expertise. Further, unlike other areas of the IT infrastructure, where
logging has a negligible impact on system performance, database logging does actually
slow down the database, especially when all access to data is recorded. High-
performance databases are meant to provide thousands of data transactions per second,
and logging all of those events takes power and space that most DBA’s don’t want to
sacrifice. From the DBA perspective, their job is not to log, but to ensure the smooth
functioning of the database and quick responses to database queries by customers. To top
it off, few security professionals are familiar with in-depth details of database logging.

But it Has to be Done…

         Despite these challenges, database logging must be enabled and log review must
happen. For example, viewing the authentication logs is the only way to verify what
access control decisions are made, who views and downloads what data, who is
connected to the server, who is deleting or corrupting data, and whether or not a security
breach has led to unauthorized access to critical and supposedly secure information.
Reviewing database logs is the only way to know the “who, what, where, and how” if a
disgruntled employee accesses a secure customer list to steal confidential data or, worse,
to modify it to cause embarrassing problems for company executives (!). It is unlikely
that intrusion detection or other security technology would stop this type of problematic
user-activity in time, but records of the employee’s search would be found, immutable, in
database logs. Having such logs ready for real-time analysis and reports could mitigate
the damage from that type of attack or abuse. In fact, one of the more important database
logs is actually a log of DBA activity. DBA’s have access to all sorts of confidential
information that is stored in the database—patient information in hospitals, financial
information in financial institutions, and credit card information in retail stores. They
also have the best ability to modify or corrupt covert data. It is essential that DBA
activity logs be collected, reviewed, and—yes!—protected from DBAs themselves as a
“separation of duty” measure, because with near-unbridled access to the company crown
jewels, they could present an internal threat to company security. Of course, this brings
up another known point of resentment for DBA’s towards logging!

        In addition to security, database logging and log analysis must be performed for
IT auditors to enable regulatory compliance with the slew of government mandates for
preserving and securing data. Payment Card Industry Data Security Standards (PCI-
DSS), designed to enhance payment account data security, mandates that companies
monitor their logs; although it does not specify database logs, this information would be
crucial to guaranteeing secure payment information, since this data is stored in a
database. The Sarbanes-Oxley Act (SOX) mandates that companies must have an
assurance of internal controls. In spirit, this regulation means that officers of the
company should be sure that their financial records, stored in databases, remain intact and
unmodified. Of course, it is a logical conclusion that if financial data is stored in
databases and this financial data must be locked, safe and secure, the best way to
guarantee data security and integrity is to review the database logs. The Health Insurance
Portability and Accountability Act (HIPAA) requires that patient information (again,
stored in a database) is kept secure and controlled. Imagine if a nurse were interested in
peeking at celebrity health records. If she isn’t caught red-handed at the computer, how
would anyone know? The answer should already be obvious- look at the logs. Perhaps
the user name of Nurse Smith, who has no business accessing the database, will show up
as having viewed a chart detailing the latest Hollywood star’s emergency-room treatment
for a drug overdose, and the hospital will know that she has accessed confidential
records. More generally, IT governance best practices frameworks such as the Control
Objectives for Information and related Technology (COBIT) also steer IT users towards
database logging.

Database Logging Doesn’t Have to be A Challenge…

        Enterprises are faced with a staggering amount of logs, and databases are among
the most “chatty” log sources. The presence of these logs and their review and analysis
are essential to ensure IT security and compliance, but, unfortunately, for a variety of
reasons, the cards are stacked against their easy and comprehensive collection, review,
and analysis due to the reasons mentioned above. So what’s to be done?

        As mentioned before, most commercial databases log surprisingly few events by
default. For those companies that use database logging capabilities in only the most basic
way, a manual log review may be suitable. However, if any kind of database security
“best practices” are being followed and more comprehensive logging is enabled,
automation of log analysis and log management via some technology is required.
Simpler log analysis tools, often provided by database vendors, allow skilled DBAs to
review logs on a specific database server and gain some insight into database activity, but
do not provide any real-time analysis in the form of alerting or alarms.
        To ease the necessary burden of log collection and review, leading security
technology vendors offer more advanced log management appliances that allow
automation of what could be a time-consuming, manual-labor -intensive process (or,
worse, an insurmountable obstacle) including monitoring of logs, searches of logs, and
instant responses in the case of a breach or suspicious database activities. Most
importantly, these tools work across multiple database servers and even across database
types in combination with logs from servers, security devices, and other network
architecture components. Analysis of all of these logs via one device allows users to put
the database data in the context of other enterprise log data and to correlate database
activity with other activity elsewhere on the network. This multi-faceted log
management solution paints a more accurate picture of IT infrastructure activity and is
more desirable to and more efficient than using separate database, security, server, and
network logging tools.

        Imagine a hacker connecting to a company’s web server, and deploying malware
to hack deeper inside the company in an attempt to access or steal database information.
To investigate the situation if it comes to light (and with the proper security technology, it
most definitely would come to light), a company would want to have a single solution or
technology that can enable log data from multiple sources (databases, firewalls, routers,
servers, applications, operating systems, and network devices) so that information about
the attack and its effects (not just on the database specifically targeted but also on other
parts of the IT infrastructure) is coherent and readily available and accessible. A single,
one-stop security solution for log management simplifies the process greatly.

        Another advantage of advanced log management tools is the automation of the log
management lifecycle, from the collection of logs and where they are generated to the
secure transfer of the log data to the company’s central server for analysis and storage.
From the issuance of real-time alerts to DBAs in the event of a breach to the provision
reports and analytics based on log data. From the secure storage of the logs as long as is
mandated by whatever retention policy under which the company operates to the safe
destruction of the logs when it is acceptable to do so.

        Obviously, choosing between a simple analysis tool and a more advanced log
management deployment depends on many company factors-- budget, IT resources, size,
and what sort of regulatory mandates the organization is subject to. Deploying an
enterprise-wide solution is, of course, more complicated than simply installing a tool on
an individual server, but the benefits of such broad deployment via a true log
management appliance will extend far beyond solving a single tactical problem.

        Satisfying current operational, security, and compliance requirements requires
databases to be configured with detailed logging. Unfortunately, the inevitable result of
enabling this detailed logging is a cascade of log data, the likes of which no one person or
team would be able to manually process. For enterprises that are serious about securing
their system, using log management tools for log automation is absolutely essential.
While database-vendor-specific tools are better than nothing, combining database log
management with other similar projects that manage logs from other sources and using a
single platform for all of them is the desirable option to deter internal and external
threats, and make shorter work of regulatory compliance.

        In summary, getting familiar with database logging and log analysis is a must for
today’s information security professionals. Security and compliance drivers will make
database log management ubiquitous in the coming years, and it’s never too late to start
getting up to speed with these complicated subjects.

ABOUT THE AUTHOR:

This is an updated author bio, added to the paper at the time of reposting in 2010.

Dr. Anton Chuvakin (http://www.chuvakin.org) is a recognized security expert in the
field of log management and PCI DSS compliance. He is an author of books "Security
Warrior" and "PCI Compliance" and a contributor to "Know Your Enemy II",
"Information Security Management Handbook" and others. Anton has published dozens
of papers on log management, correlation, data analysis, PCI DSS, security management
(see list www.info-secure.org) . His blog http://www.securitywarrior.org is one of the
most popular in the industry.
In addition, Anton teaches classes and presents at many security conferences across the
world; he recently addressed audiences in United States, UK, Singapore, Spain, Russia
and other countries. He works on emerging security standards and serves on the advisory
boards of several security start-ups.
Currently, Anton is developing his security consulting practice
www.securitywarriorconsulting.com, focusing on logging and PCI DSS compliance for
security vendors and Fortune 500 organizations. Dr. Anton Chuvakin was formerly a
Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic
as a Chief Logging Evangelist, tasked with educating the world about the importance of
logging for security, compliance and operations. Before LogLogic, Anton was employed
by a security vendor in a strategic product management role. Anton earned his Ph.D.
degree from Stony Brook University.

				
DOCUMENT INFO
Shared By:
Categories:
Stats:
views:39
posted:7/27/2011
language:English
pages:5
Description: Misc security dump