Maintaining a reliable and secure repository of logs is important for many reasons: establishing a foresnic trail of evidence in the case of fraud or attack, and enabling event correlation across many devices, among others. Particularly in regulated industries, management should enact controls that prevent security, application and system logs from being tampered with.
Many organizations choose to consolidate their logs on to a centralized syslog server. Many devices and just about all UNIX-like operating systems (Linux, free/net/open BSD, Solaris, AIX) support syslog natively. Windows-based systems require a tool to convert event logs to syslog.
Syslog is a simple protocol and is easy to wrap some very effective security around. The goal is remove as many opportunities for the central syslog server to be compromised as practical. There are 3 aspects to hardening a syslog server that we’ll cover:
- The operating system
- The network
- The application
- The users and administrators
The Operating System
Hardening
- The first step is to research a hardening guide for your operating system. Search google for “hardening X”, where X is the name of your operating system, such as Redhat, FreeBSD, etc.
- Generally, you will want to disable just about every service execpt for sshd and the syslog server process.
- Do not run a local dns server on the system. This can be a source of compromise if an exploit is found.
Management Processes
Key processes need to be maintained to ensure the integrity of the log server. We won’t go into detail on how to accomplish these, as any mature IT organization will have functioning version of these processes.
- Patch Management
- Vulnerability scanning
- User Account Management
- Control of root access
The Network
Segregate the syslog server from the rest of the network servers with a firewall. On the firewall, we will want to open just the port needed for syslog logs to flow from clients to the server – generally UDP/514. Opening other ports, such as SSH may be desirable, but will increase the exposure of the server. An alternative approach is to require authentication to the segmenting firewall, which will enable an additional set of ports, such as SSH. We will, of course, want to log the authentication successes and failures. Additionally, we will want to prevent the syslog server from initiating any connections outbound to the Internet.
Firewall rule summary:
- Deny all ports in to syslog server
- Allow UDP/514 to the syslog server
- Allow TCP/22 to the syslog server if authenticated
- Deny all ports outbound from the syslog server
- inbound/outbound ports requires to support authentication system (such as RSA) – Optional
The Application and Protecting the Logs
- Run syslog service in chroot environment
- Configure the syslog service to store logs in partition that is writable only to the syslog user.
- Create a script, to be run via cron as root, to move logs out of to the area accessible to syslog user, preferably on a daily basis.
The Users and Administrators
- Separation of duties – administrators with access to the syslog server should not also perform administrative duties on other servers.
- Authentication – Users should be required to use a 2 factor authentication system, such as RSA one time tokens.
Summary
What is described here is probably far beyond what most organizations will want to implement to protect their logs. This should serve as a list of “best practices” that can be implemented, depending on the perceived threats in a given organization. Logs are very critical, and serious consideration should be paid to each of the recommendations. The depth of protections that may need to be applied to a logs provides a good example of why a Log Management Service should be considered.
分享到:
相关推荐
### 构建商务沟通框架 #### 一、商务沟通定义及其价值 商务沟通是指在商业环境中,通过一系列符号、标志和行为系统地交换与解释信息的过程。它不仅限于传统意义上的语言交流,还包含了非语言沟通等多种形式。...
总结JDBC连接SQLServer的错误Error establishing socket
(USENIX ATC ’15) is sponsored by USENIX.Establishing a Base of Trust with Performance Counters for Enterprise WorkloadsAndrzej Nowak, CERN openlab and École Polytechnique Fédérale de Lausanne ...
An error has occurred while establishing a connection to the server. (provider: Named Pipes Provider, error: 40 – Could not open a connection to SQL Server) (Microsoft SQL Server, Error: 5) An e
应用液压冲击颅脑损伤仪建立标准化兔外伤性视神经损伤模型,于金国,于荣国,目的 应用液压冲击颅脑损伤仪建立标准化兔视神经损伤动物模型,并应用闪光视觉诱发电位观察其修复过程.方法 64只中国白兔作为实验对
如果提示错误"Error establishing socket",请根据之前的说明安装相应的 SQL Server 2000 补丁即可。如果提示"ClassNotFoundException",那一定是 Class.forName("com.microsoft.jdbc.sqlserver.SQLServerDriver"); ...
此文档中详细的记载了,谈JDBC SQLSERVERError establishing socket,希望可以帮到下载的朋友们!
Queries not running fast enough? Tired of the phone calls from frustrated ... You'll learn to be proactive in establishing performance baselines using tools like Performance Monitor and Extended Events.
整理发布的Establishing a Corporate University Seven Steps to Success致力于为大家学习、参...该文档为Establishing a Corporate University Seven Steps to Success,是一份很不错的参考资料,具有较高参考价值...
- **错误信息**:“java.sql.SQLException:[Microsoft][SQL Server 2000 Driver for JDBC] Error establishing socket.” - **解决办法**: - 将SQL Server升级至SP3或更高版本。 - 开启1433端口,确保TCP/IP连接...
对于很多初学者而言,在尝试使用 SQL Server 2000 通过 JDBC 驱动连接数据库的过程中经常会遇到一个常见的错误:“[Microsoft][SQL Server 2000 Driver for JDBC] Error establishing socket.” 即使安装了 SP3 补丁...
KEPServerEX IoT Gateway REST and MQTT Client Agent Demo with Node-RED KEPServerEX IoT Gateway 是一个强大的工业物联网网关,能够将工业设备连接到云端和企业系统。这个网关支持多种工业协议和数据格式,能够...
- 如果你遇到"Error establishing socket"的错误,可能是SQL Server 2000的SP补丁没有正确安装。在微软官网上可以找到不同版本的SQL Server 2000 SP3补丁,如chs_sql2kdesksp3.exe(服务器版)、chs_sql2ksp3.exe...
Error occurred while establishing connection to Oracle server. You might have 32-bit connectivity components installed on the machine, in order for SSMA to make use of those connectivity libraries, ...
You’ll learn to be proactive in establishing performance baselines using tools such as Performance Monitor and Extended Events. You’ll recognize bottlenecks and defuse them before the phone rings. ...
Fri Jun 08 13:09:27 CST 2018 WARN: Establishing SSL connection without server's identity verification is not recommended. According to MySQL 5.5.45+, 5.6.26+ and 5.7.6+ requirements SSL connection ...
以下是一篇关于编程报错、软...程序运行时抛出异常:“System.Data.SqlClient.SqlException: A network-related or instance-specific error occurred while establishing a connection to SQL Server.”。 4. 处理
1. **An error has occurred while establishing a connection to the server. (provider: Named Pipes Provider, error: 40 – Could not open a connection to SQL Server) (Microsoft SQL Server, Error: 5)** 2....
### 建立对PDN仿真信心的关键知识点 #### 一、引言 在现代电子产品设计领域中,信号完整性(Signal Integrity, SI)是确保电路板性能与可靠性的关键因素之一。随着电子设备向更高频率、更小尺寸发展的趋势,电源...