19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.133 Checking the log files of a database system<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrator, auditor<br />

<strong>The</strong> logging and auditing functions available in a database system must be<br />

utilised to an appropriate extent. Logging too many events will impair the<br />

performance of a database and cause log files to accumulate rapidly. A<br />

balance always needs to be struck between the requirement to collect as much<br />

information as possible in order to ensure database security, and the capability<br />

to store and analyse this information.<br />

In this context, the following occurrences are of particular interest:<br />

- Times and duration of user logins<br />

- Number of database connections<br />

- Failed or rejected attempts to establish connections<br />

- Occurrence of deadlocks within the database system<br />

- I/O statistics for every user<br />

- Access to system tables (refer to S 4.69 Regular checks of database<br />

security)<br />

- Generation of new database objects<br />

- Data modifications (if required, together with the date, time and user)<br />

However, the logging of security-related events only proves useful if the<br />

recorded data can also be analysed. For this reason, the log files should be<br />

checked by an auditor at regular intervals. If, for organisational or technical<br />

reasons, it is not possible to engage an independent auditor for the purpose of<br />

analysing the log files, it will be very difficult to control the activities of the<br />

database administrator.<br />

<strong>The</strong> logged data must be deleted at regular intervals in order to prevent the log<br />

files from growing excessively. However, the log files must only be deleted<br />

after they have been viewed and analysed. This can be done manually or<br />

automatically, if appropriate tools are available.<br />

Furthermore, access to the log files must be carefully restricted. On one hand,<br />

intruders must be prevented from concealing their activities through a later<br />

manipulation of log files; on the other hand, a selective analysis of the log<br />

files allows profiles of users to be generated. Consequently, no modifications<br />

should be permitted and read-access should only be granted to the auditors, for<br />

example.<br />

To facilitate analysis of the log files, the database administrator can make use<br />

of additional tools which automatically perform monitoring. Such products<br />

can, for example, analyse the log files of a database system in accordance with<br />

specified patterns and output an alarm under certain conditions.<br />

Additional measures which need to be observed in this context are stated in S<br />

2.64 Checking the log files.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!