[go: up one dir, main page]

0% found this document useful (0 votes)
20 views7 pages

2018-Computer and System Logging Policy

Uploaded by

Kevin Katusabe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views7 pages

2018-Computer and System Logging Policy

Uploaded by

Kevin Katusabe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Computer and System Logging Policy

1. Overview
Computer logs are essential to the operational management of an organization. They provide a
primary mechanism for automated tracking and reporting for review, audit, and compliance
functions as well as a useful mechanism for tracking changes and troubleshooting.

2. Purpose
Frequent monitoring and logging components are required to effectively assess information
system controls, operations, and general security. This policy provides a set of logging policies
and procedures aimed to establish baseline components across the Thiel College Network.

3. Scope
This policy applies to all Thiel College staff that create, deploy, or support application and
system software.

4. Policy
A. GENERAL

Access to Thiel College’s network, systems and communications shall be logged and
monitored to identify potential misuse of systems or information. Logging activities
shall include regular monitoring of system access to prevent attempts at
unauthorized access and confirm access control systems are effective. Log servers
and documents shall be kept secure and only made available to personnel
authorized by the Director of Information Systems. These logs shall be kept as long
as necessary or required for functional use or appropriate state regulation or law.

Thiel College’s information systems (servers, workstations, firewalls, routers,


switches, communications equipment, etc.) shall be monitored and logged to:

 Ensure use is authorized

 Manage, administer, and troubleshoot systems

 Protect against unauthorized access

 Verify security procedures and access

 Verify system and operational security

 Comply with Thiel College policies and procedures


 Detect and prevent criminal or illegal activities

The system administrator shall implement automated audit trails for all critical
systems and components. At a minimum, these logs shall be used to reconstruct the
following events:

 Individual user accesses to systems and sensitive information

 All actions taken by any individual with administrative privileges

 Access to audit trails

 Invalid logical access attempts and failures

 Use of and changes to identification and authentication mechanisms—


including but not limited to creation of new accounts and elevation of
privileges—and all changes, additions, or deletions to accounts with
administrative privileges

 Initialization, stopping, or pausing of the audit logs

 Creation and deletion of system level objects

B. UNDERLYING REQUIREMENTS

All systems that handle confidential information, accept network connections, or


make access control (authentication and authorization) decisions shall record and
retain audit logging information to:

 Determine the activity that was performed

 Who or what performed the activity, including where or on what system the
activity was performed (subject)

 Systems and objects involved

 When the activity was performed

 Status (such as success vs. failure), outcome, and/or result of the activity

Thiel College shall implement a suitable logging infrastructure and configure all
critical devices, systems, and applications with logged audit trails. The system
administrator shall ensure important events and audit trails are logged. File integrity
monitoring/change detection software shall review logs and issue alerts if the log
data is altered.

C. ACTIVITIES TO BE LOGGED

Support staff shall be assigned to review and monitor the logs for systems under
their control. Logs shall be reviewed on a regular and on-going basis. The frequency
of review shall be determined according to the sensitivity of the information stored,
the function of the system, and other system requirements as determined by the
system administrator. Procedures should verify that logging is active and working
properly to:

 Ensure events are properly classified

 Review logging for performance delays

 Ensure compliance related logging cannot be bypassed

 Verify access to log files is properly restricted

 Assist with investigations

Logs shall be created whenever the following activities are performed by a system,
application, or user:

 Creating, reading, updating, or deleting confidential information, including


confidential authentication information such as passwords

 Initiating or accepting a network connection

 Authenticating user access and security authorizations

 Granting, modifying, or revoking access rights to include new user or group


additions, user privilege modifications, file or database object permissions,
firewall rules, and user password changes

 Configuring systems, networks, or services for maintenance and security


changes including installation of software patches and updates, or other
installed software

 Changing statuses of application process startup, shutdown, and/or restart

 Application process aborts, failures, or abnormal conditions due to resource


limits or thresholds (such as for CPU, memory, network bandwidth, disk
space, or other key system resources), failure of network services, or
hardware faults
 Detection of suspicious/malicious activity such as from an intrusion detection
or prevention system, anti-virus, or anti-spyware system

D. SYSTEM LOG ELEMENTS

System events and activities that shall be monitored and logged are as follows:

 System administrator and system operator activities

 System start-ups and shut-downs

 Logging start-ups and shut-downs

 Backups and restorations/roll-backs

 Exceptions and security events

 Database commits and transactions

 Protection software and hardware (firewalls, routers, etc.)

 Intrusion Detection Systems (IDS) and Intrusion Prevention Systems

 Modifications to data characteristics including permissions, location, file type

 Authentication successes and failures (e.g. log in, log out, failed logins)

E. APPLICATION LOG ELEMENTS

Third party and custom application software logging requires more than just relying
on server based system logs. Application logs help identify security incidents,
establish baselines, provide information about problems and unusual conditions,
assist with incident investigation, and help detect intrusions and errors. Application
events and activities that shall be monitored and logged include:

 Application authentication (e.g. successes, failures, logouts)

 Data audit trails (e.g. access to sensitive data, adding data, modifying data,
deleting data, exporting and importing data)

 Input validation failures (e.g. protocol violations, unacceptable encodings,


invalid parameter names and values)

 Output validation failures (e.g. database record mismatch, invalid data


encoding)
 Suspicious behavior (e.g. multiple records deleted in a short period of time,
invalid access attempts)

 Session management failures (e.g. cookie session identification value


modifications)

 Application errors and events (e.g. syntax and runtime errors, connectivity
problems, third party service error messages, file system errors, sequencing
failure)

 Higher-risk functionality (e.g. adding and deleting users, changes to access


privileges, use of administrative privileges, access by application
administrators, and access to sensitive data)

 Legal compliance services (e.g. permissions to transfer information, terms of


use, and parental consent)

 Security events or warnings

F. LOGGING ELEMENTS

Log entries can contain a number of elements based on the type and function of the
audited system/process. Generally, automated audit trails shall include the
following information:

 Host name, system component, or resource

 Date/Time Stamp

 Application ID (e.g. name and version)

 Initiating Process ID or event origination (e.g. entry point URL, page, form)

 Code location (e.g. module, subroutine)

 User initiating action (e.g. user ID)

 Event type

 Result status (e.g. success, failure, defer)

 Resource (e.g. identity or name of affected data, component)

 Location (e.g. IP address or location)


 Severity of event (e.g. emergency, alert, fatal error, warning, information
only)

 Other (e.g. parameters, debug information, system error message)

G. FORMATTING AND STORAGE

The system shall support the formatting and storage of audit logs to ensure integrity
enterprise-level analysis and reporting. Mechanisms known to support these goals
include but are not limited to the following approaches:

 Collecting Microsoft Windows Event Logs from servers by a centralized


logging management system

 Storing logs in a documented format and sent via reliable network protocols
to a centralized log management system

 Storing log entries in a SQL database that generates audit logs in compliance
with the requirements of this policy

H. INFORMATION SECURITY ISSUES

Logs are one of the primary tools used by system administrators and management
to detect and investigate attempted and successful unauthorized activity and to
troubleshoot problems. Detailed procedures that support this policy shall be
developed to protect against and limit log security risks such as:

 Controls that limit the ability of administrators and those with operating
system command line access to disable, damage, or circumvent access
control and audit log mechanisms

 Protecting the contents of system logs from unauthorized access,


modification, and/or deletion

 Limiting outside access to logging systems to extreme or emergency


circumstances. Any emergency access should be authorized by the [Insert
Appropriate Role] and use of tools bypassing security controls should be
documented

 Limiting changes to the auditing policies to stop logging of an unauthorized


activity. Log settings should be set to track and record user policy changes

I. ADMINISTRATIVE RESPONSIBILITIES

The system administrator shall be responsible for:


 Separating duties between operations and security monitoring

 Ensuring a regular review of activity audit logs, access reports, and security
incidents

 Approving the types of logs and reports to be generated, review activities to


be performed, and procedures that describe the specifics of the reviews

 Procedures that specify monitoring log-in attempts, reporting discrepancies,


and processes used to monitor log-in attempts

 Procedures that specify audit controls, hardware, software, and/or


procedural mechanisms that record and examine activity in information
systems

 Procedures ensure that the audit controls meet security requirements by


recording and examining activity related to sensitive information

 Securing audit trails by limiting viewing to those with a job-related need

 Protecting audit trail files from unauthorized modifications

 Ensuring audit trail files are promptly backed up to a centralized log server or
media

5. Audit Controls and Management


On-demand documented procedures and evidence of practice should be in place for this
operational policy as part of Thiel College procedures. Examples of auditable controls include:

 On demand and historical log reviews of areas described in this policy

 Documented communications surrounding logging activities

 Incident response procedures

6. Enforcement
Staff or faculty members found in policy violation may be subject to disciplinary action, up to
and including termination.

7. Distribution
This policy is to be distributed to all Thiel College staff, faculty and contractors using Thiel
College information resources.

You might also like