19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.25 Use of Logging in UNIX Systems<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrator<br />

<strong>The</strong> logging options offered by the individual UNIX system must be used and,<br />

where appropriate, be supplemented by programs or shell scripts.<br />

<strong>The</strong> safeguards outlined below should be adopted.<br />

- <strong>The</strong> log files must be evaluated regularly. Such an analysis should not<br />

always be made at the same time, to prevent an aggressor from exploiting<br />

this fact. If, for instance, the administrator reviews the system activities<br />

every day at 5 p.m., an offender might get to work unnoticed at about 6<br />

p.m.<br />

- Depending on the type of data logged, it can be necessary to intervene as<br />

quickly as possible. To ensure that the Administrator is informed<br />

automatically of such events (e.g. log file too big, important server<br />

processes terminated, multiple attempted root log-ins at unusual times of<br />

the day etc.), semi-automatic log file parsers should be used to generate<br />

alerts (e.g.swatch, logsurfer or checksyslog).<br />

- To the extent required, log files should be backed up before they get too<br />

big or are deleted by the system.<br />

- <strong>Information</strong> from files like wtmp, utmp, wtmpx, utmpx, etc. should be<br />

scrutinised especially carefully as these files are easy to tamper with.<br />

- File attributes of the log files should be set in such a way that unauthorised<br />

persons cannot make any changes to, or analyses of, the listings.<br />

- As a minimum, the following log files should be generated and monitored:<br />

log-ins (including unsuccessful log-in attempts), su calls, error listing files /<br />

logging of important processes (errorlog), Administrator activities<br />

(especially commands executed by root). Further information on this<br />

subject will be found in S 4.106 Activation of system logging.<br />

<strong>The</strong> last command displays log-in and log-out information such as the time<br />

and terminal for each user. <strong>The</strong> Administrator should use this command to<br />

check regularly whether any users have been logging on through an<br />

unusual channel, e.g. over modem lines or via FTP.<br />

If log data is generated on many systems, it is recommended that a dedicated<br />

loghost which is specially secure is used. Forwarding of syslog messages on<br />

this loghost must be activated in the syslog configuration file (see S 4.106<br />

Activation of system logging).<br />

<strong>The</strong> logged data generated must only be used in order to monitor the proper<br />

use of the <strong>IT</strong> systems and not for any other purposes, especially not for the<br />

purpose of creating user performance profiles (see also S 2.110 Data Privacy<br />

Guidelines for Logging Procedures).<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Regular processing and<br />

evaluation<br />

Automatic alerting<br />

Dedicated loghost

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!