05.02.2013 Views

download issue 24 here - Help Net Security

download issue 24 here - Help Net Security

download issue 24 here - Help Net Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

In any environment, large or small, the managing and interpreting of log files<br />

is a time consuming and expensive responsibility. Generally, this particular<br />

job is perceived as a boring waste of time, and is usually pushed onto whomever<br />

is the “weakest” part of the team and executed half-heartedly and - t<strong>here</strong>fore<br />

- poorly.<br />

I, for one, believe that log files contain a lot of<br />

wisdom that most systems, applications and<br />

network administrators miss. While log files<br />

are considered a necessary evil and are consulted<br />

only when someone is complaining<br />

about problems with certain services, they are<br />

key to understanding the baseline behavior of<br />

your environment (when everything is running<br />

smoothly) and are t<strong>here</strong>fore fundamental for<br />

the detection of anomalies. “Love thy logs like<br />

you love thyself” should be a mantra for all<br />

previously mentioned administrators.<br />

Even in the smallest of environments you'll<br />

have a dozen computers (workstations and<br />

servers) and a few network appliances (routers,<br />

firewalls, switches, access points). Add<br />

some multifunctional printers into the mix, and<br />

you're good to go.<br />

The great majority of these devices will be<br />

spitting out messages with a vengeance, and<br />

it is you who must prioritize and process these<br />

events. Even if you think itʼs not necessary,<br />

you will probably have to do it as a compliance<br />

requirement.<br />

All of this would be a big problem if you had to<br />

do it step-by-step, page-by page, by yourself.<br />

Luckily, t<strong>here</strong> are plenty of products out t<strong>here</strong><br />

today that can provide these two services. I<br />

am, of course, talking about log management,<br />

and security incident and event management<br />

solutions. The former acts as a black hole into<br />

which all log events within your network are<br />

siphoned and kept in. The latterʼs task is to<br />

correlate events you throw in it and provide<br />

you with a Web 2.0 dashboard from which you<br />

can analyze the results.<br />

www.insecuremag.com 57

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!