19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 18: Managing Security Processes<br />

✓ Finding critical security events in system log files is difficult, if not<br />

impossible. It’s just too tedious a task for the average human to accomplish<br />

effectively.<br />

✓ Depending on the type of logging and security equipment you use, you<br />

might not even detect some security events, such as intrusion detection<br />

system (IDS) evasion techniques and hacks coming into allowed ports<br />

on the network.<br />

Instead of panning through all your log files for hard-to-find intrusions, here’s<br />

what I recommend:<br />

✓ Enable system logging where it’s reasonable and possible. You don’t<br />

necessarily need to capture all computer and network events, but you<br />

should definitely look for certain obvious ones, such as login failures,<br />

malformed packets, and unauthorized file access.<br />

✓ Log security events using syslog or another central server on your network.<br />

Do not keep logs on the local host, if possible, to help prevent the<br />

bad guys from tampering with log files to cover their tracks.<br />

The following are a couple of good solutions to the security-monitoring dilemma:<br />

✓ Purchase an event-logging system. A few low-priced yet effective<br />

solutions are available, such as GFI EventsManager (www.gfi.com/<br />

eventsmanager). Typically, lower-priced event-logging systems usually<br />

support only one OS platform — Microsoft Windows is the most common.<br />

Higher-end solutions, such as HP ArcSight Logger (www.hpenterprise<br />

security.com/products/hp-arcsight-security-intelligence/<br />

hp-arcsight-logger), offer both log management across various platforms<br />

and event correlation to help track down the source of security<br />

problems and the various systems affected during an incident.<br />

✓ Outsource security monitoring to a third-party managed security<br />

services provider (MSSP) in the cloud. Dozens of MSSPs were around<br />

during the Internet boom, but only a few strong ones remain, such as<br />

BT’s Assure managed service (www.globalservices.bt.com/uk/<br />

en/solutions/monitor_my_network_security), Dell SecureWorks<br />

(www.secureworks.com) and Alert Logic (www.alertlogic.com).<br />

Now considered cloud service providers, the value in outsourcing security<br />

monitoring is that these companies often have facilities and tools that<br />

you would likely not be able to afford and maintain. They also have analysts<br />

working around the clock and have the security experiences and<br />

knowledge they gain from other customers to share with you.<br />

When these cloud service providers discover a security vulnerability or<br />

intrusion, they can usually address the issue immediately, often without<br />

your involvement. I recommend at least checking whether third-party<br />

333

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!