OCIO/G4.23 Government guideline on cyber security ISMF Guideline 23 Monitoring and event logs BACKGROUND Security event logging and monitoring involves the capturing and examining events that may have an impact on the confidentiality, integrity or availability of information assets. Well-defined procedures and practices are the prerequisite for identifying and handling these events to protect agency information assets. In conjunction with appropriate tools, these can assist in detecting attempted and actual security violations. Event logs are records of current and past management, operational and technical information systems events or user activities. They may have several functions, each devoted to a particular activity type, such as user access or system status. Log monitoring and analysis is an examination of activity to help accomplish several securityrelated objectives, including individual accountability, reconstruction of information security related events, intrusion detection, and problem analysis. It can facilitate establishing the records needed for security auditing and forensic analysis and/or investigations. This guideline will assist agencies in establishing and integrating appropriate logging and monitoring of information security events with organisational event monitoring and cyber security management practices. This guideline supports implementation of ISMF Policy Statement 23. GUIDANCE Agencies are responsible for developing and implementing policies and procedures to ensure that their system or resources have not been harmed by hackers, insiders, or technical , and that exploitation of security vulnerabilities are prevented or managed in a timely fashion. Such policies and procedures will need to account for the unique business environment and risk profile that has been determined by each business. What is considered ‘acceptable practice’ in one agency may not necessarily be considered acceptable in a different business due to the sensitivity of information assets involved and/or the findings of a business impact assessment against identified risks. Agencies are responsible for developing and implementing procedures in accordance with the requirements of the: Protective Security Management Framework [PSMF] Information Security Management Framework [ISMF] ISMF Guideline 23 This guideline assists Business Owners and Responsible Parties (as defined in the ISMF) in developing their practices and procedures for undertaking adequate logging and monitoring of user, system and activity events. PRE-REQUISITE DOCUMENTS The ISMF should be read in conjunction with this guideline. Implementing the guidance in this document may assist in meeting the requirements contained in the following ISMF Policy Statements: ISMF Policy Statement 23 (Monitoring and event logs) ISMF Policy Statement 19 (Information back-up, archival and retrieval) Policy Statement 33 (Cryptographic requirements) The predominant ISMF standards relating to security event logging and monitoring are ISMF Standards 71, 72, 73, 74 and 75 respectively. EVENT LOGGING AND MONITORING Event logging is the creation of a record set that documents a sequence of specific operations, events or other activities that may have affected the confidentiality, integrity and/or availability of information and associated assets. It can help raise the security posture by increasing accountability for all user actions, thereby improving the chances that malicious behaviour and other security-relevant activity can be prevented and detected.. Event monitoring can be used to identify events while they are occurring, or reconstruct them afterwards. Examples include the process of identifying attempts to penetrate a system and gain unauthorized access. Although often thought of as "after the fact", monitoring logs in real time as they are created allows activities such as intrusions to be detected. Real-time intrusion detection is primarily aimed at outsiders attempting to gain unauthorized access to the system. It may also be used to detect changes in the system's performance indicative of an attack resulting from malicious code. There may be difficulties in implementing real-time monitoring, including unacceptable system performance. Through event log analysis, damage can be more easily contained and assessed by reviewing system activity to pinpoint how, when, and why normal operations ceased. After-the-fact identification may indicate that unauthorized access was attempted (or was successful). Attention can then be given to damage assessment or reviewing controls that were attacked. Responsible Parties need to recognise the human dimension of event logging, in that event logs are only useful in planning, prevention and response activities if the information is fit for purpose and is being analysed for patterns, trends and suspicious or significant events. Government guideline on cyber security Logging and Monitoring v1.0 Page 2 of 7 ISMF Guideline 23 Table 1 – Event logging and monitoring Applicability Guidance Responsible Parties should implement procedures concerning the monitoring of significant information asset events which are commensurate to their confidentiality, integrity and availability requirements, and established through a risk-based approach for assessing the level of monitoring required that is consistent with the Government of South Australia Risk Management Policy Statement. References ISMF Standard 71 Responsible Parties should consider the following events for logging: user account and record actions, including access and changes successful and rejected authentication attempts, particularly for system operator, support user, system administrator and other trusted user roles authentication and authorisation attempts that violate access control standards data input validation failures changes to information asset configuration, privileges or security-related services, including endpoint protection and intrusion detection systems privileged activities and any associated access control system alerts, including system or service start/stop fault events ISMF Standard 71 ISMF Standard 73 ISFM Standard 74 All classifications Responsible Parties should configure logging functionality to capture, where relevant: Event date and time according to an agreed standard time source, such as an approved Coordinated Universal Time (UTC) based Network Time Protocol (NTP) service or time certification service where legal requirements may apply User identity information (e.g. user or endpoint identifier) ISMF Standard 71 ISMF Standard 75 Responsible Parties may consider undertaking and reporting on periodic event, trend and pattern analysis using suitable security information and event management platforms1. Responsible Parties should implement review mechanisms for ensuring that rectification of identified events have been effective and have not compromised related security controls. ISMF Standard 74 Business Owners should consider specifying contractual provisions that include monitoring, analysis and reporting of relevant system and security events when engaging third parties such as contractors and Suppliers (please also refer to the example provisions detailed in section BASELINE LOGGING REQUIREMENTS). ISMF Standard 58 1 Example platforms include but are not limited to the Tier 3 Huntsman Intelligent Enterprise Security Suite, the RSA Netwitness security monitoring platform or the HP ArcSight Security Intelligence and Risk Management platform. Government guideline on cyber security Logging and Monitoring v1.0 Page 3 of 7 ISMF Guideline 23 Applicability Guidance References Responsible Parties should record and retain logging information in a format that can be readily accessed and examined. ISMF Standard 71 Business Owners should retain event related information for an appropriate period with respect to applicable data retention requirements and obligations. ISMF Standard 71 [SLC] Sensitive: Legal Business Owners should clearly and explicitly establish the rights and responsibilities of management with regard to monitoring of user activity to mitigate legal challenge risks in response to actions that may be supported by event monitoring. ISMF Standard 66 [SP] Sensitive: Personal Responsible Parties should configure event recording functionality to facilitate conformance with the compliance obligations and requirements pertaining to the recording of private information pursuant to legislative requirements such as the Cth. Privacy Act 1988 or State based equivalent. ISMF Standard 72 Responsible Parties should consider real-time capable event analysis using suitable security information and event management platforms1. ISMF Standard 71 [P] Protected [I4] Integrity 4 [A4] Availability 4 EVENT LOG ACCESS AND PROTECTION When compromising a system, adversaries commonly tamper with or remove logs to cover their tracks. Especially when an adversary can access higher level privileges, the integrity of log files are in jeopardy. Sound auditing and event monitoring and analysis practices require assurances that any recorded event data is accurate, uncompromised and only available to those who are legitimately authorised to access this data. This section provides guidance for important considerations for taking appropriate measures to protect event data and thus provide assurances of data confidentiality, integrity and availability. Table 2 – Event log access and protection All classifications Responsible Parties should establish processes and procedures to safeguard the accuracy and integrity of data captured or held in event logs, such as data validity checks. ISMF Standard 72 Responsible Parties should ensure that procedures include confidentiality, integrity and availability considerations for event logging and monitoring capabilities, such as rolebased security privileges for log configuration or event record access. ISMF Standard 72 Government guideline on cyber security Logging and Monitoring v1.0 Page 4 of 7 ISMF Guideline 23 [SLC] Sensitive: Legal [SP] Sensitive: Personal Responsible Parties should include conflict of interest considerations in the assignment of event logging, monitoring and review responsibilities. ISMF Standard 72 Event logs must be retained and stored in a manner that allows their integrity and authenticity to be verified for any period required to meet all legal and regulatory requirements (e.g. signed, encrypted etc.). ISFM Standard 71 Responsible Parties should configure event recording functionality to facilitate conformance with the compliance obligations and requirements pertaining to the recording of private information pursuant to legislative requirements such as the Cth. Privacy Act 1988 or State based equivalent. ISMF Standard 72 ISMF Standard 109 BASELINE LOGGING REQUIREMENTS Baseline logging requirements can specify minimum requirements for services to capture and monitor cyber security system events. The following table provides a reference example of a set of provisions that may be integrated into contractual agreements, e.g. with third-party suppliers. Table 3 - Example Provisions for Baseline Logging Requirements Provision Standards Identification of Event Logs source device or facility All Event Logs collected on behalf of the State and Customers shall clearly identify the source device type (e.g. Router Model 123, Server Brand XYZ etc.) including the devices ‘common or network’ name. Log Retention period During the Term of the Agreement and during the term of each Customer Agreement. Destruction and Erasure of Event Logs Event Logs must be provided to each Customer (as Customer Data) upon termination or expiration of each Customer Agreement or at such other times during the Term as agreed between the Parties. Under no circumstances shall the Supplier destroy, erase or otherwise dispose of any copy of an Event Log until that Event Log has been provided to the relevant Customer in accordance with conditions contained in the relevant Customer Agreement(s). Timestamps Event Logs must derive and synchronise their local reference clocks to the State’s time provider (e.g. ntp1.sa.gov.au) unless otherwise agreed between a Customer and the Supplier in a Customer Agreement. Fields and other information to be captured by Event Logs Unless otherwise agreed between a Customer and the Supplier, the Supplier agrees to capture (so far as it is technically possible for the device or ICT system to do so) the following fields and other information in Event Logs: User identification, login credentials, account identification or other such information Device configuration changes and modifications Uniform Resource Locators (URL) or hyperlinks Source/destination addresses including but not limited to: Media Access Control (MAC), Internet Protocol (IP), IP logical port assignment, Virtual Government guideline on cyber security Logging and Monitoring v1.0 Page 5 of 7 ISMF Guideline 23 Provision Standards Local Area Network (VLAN) tag, Multi-Protocol Label Switching (MPLS) tag and other relevant traffic mapping identifying source(s) and destination(s) of payload and transport information Access to Event Logs User agents (i.e. browser types) incorporating version or variant numbers Default server/device Event Logs fields and information (forwarded to central log server). Customers must be provided with a copy of all Events Logs relative to the Services provided under their respective Customer Agreement(s) within fourteen (14) calendar days of making a request to the Supplier. If requested by the State’s PCA, the Supplier must provide a copy of all Event Logs to the State within fourteen (14) calendar days (or such longer period as agreed) of making a request to the Supplier. In certain instances, the Supplier may be required to provide raw Event Logs in their native device-generated format for purposes of forensic analysis and/or investigations. Format of Event Logs Where the Supplier obtains and manages Event Logs in a proprietary format, the Supplier must provide such Event Logs to Customers and the State in an open or commonly readable format (i.e. using an ‘exportable’ format). Security classification and/or protective marking of Event Logs Unless otherwise agreed between the Customer and the Supplier, the Supplier agrees to treat, handle, transmit, maintain and manage Event Logs in accordance with the corresponding security classification obligations and requirements of the system, platform, service or device associated with the Deliverable. ADDITIONAL INFORMATION Detailed provisions for web server and web application logging configurations are provided by the Government of South Australia web applications and web server security standards. Further information and good practice guidance on this topic are available from the National Institute of Standards and Technology (NIST), the Australian Signals Directorate (ASD) and the SANS institute. This guideline does not aim to provide the reader with all of the responsibilities and obligations associated with the logging and monitoring of cyber security events. It is merely an overview of the information provided in applicable government cyber security policy, applicable governance frameworks and the resources and utilities available at the time of publication. It is highly recommended that agencies review these documents in their entirety. The individual requirements of agencies will have direct bearing on what measures are implemented to mitigate identified risk(s). Government guideline on cyber security Logging and Monitoring v1.0 Page 6 of 7 ISMF Guideline 23 REFERENCES, LINKS & ADDITIONAL INFORMATION 1. OCIO/F4.1 Government of South Australia Information Security Management Framework [ISMF] 2. PC030 Government of South Australia Protective Security Management Framework [PSMF] 3. Australian Government Protective Security Policy Framework [PSPF] 4. Australian Government Information Security Manual, Australian Signals Directorate 5. Strategies to Mitigate Targeted Cyber Intrusions – Mitigation Details, Australian Signals Directorate 6. Guide to Computer Security Log Management, National Institute of Standards and Technology (NIST), United States 7. Logging Technology and Techniques, SANS Institute, United States ID OCIO_G4.23 Classification/DLM PUBLIC-I2-A1 Issued April 2014 Authority State Chief Information Security Officer Master document location Q:\SecurityRiskAssurance\Policy Development Sub-program\Policy and Standards\ISMF\v3.2\ISMFguidelines\ Records management File Folder: 2011/15123/01 - Document number: 8354295 Managed & maintained by Office of the Chief Information Officer Author(s) Christian Bertram, Enterprise Architect Reviewer(s) Tony Stevens, Senior Analyst Jason Caley CISM, MACS (CP), IP3P, CRISC, CEA, Principal Policy Adviser Compliance Discretionary Next review date March 2016 To attribute this material, cite the Office of the Chief Information Officer, Government of South Australia, ISMF Guideline 23. This work is licensed under a Creative Commons Attribution 3.0 Australia Licence Copyright © South Australian Government, 2014. Disclaimer