Chapters 7-9 Flashcards
(69 cards)
What is a Security Audit?
Independent review of a system’s records and activities to determine adequacy of system controls, compliance, detect breaches, and change recommendations.
What is the Objective of a Basic Security Audit?
Establish accountability for security system entities
What is a Security Audit Trail?
Chronological record of system activities that can reconstruct and examine a sequence of environments and activities
Common Criteria for an Event
- Introduction of Objects
- Deletion of Objects
- Distribution or Revocation of Access Rights or Capabilities
- Changes to Subject or Security Attributes
- Policy Checks by Security Software
- Use of Access Rights to Bypass Policy Check
- Use of Identification and Authentication Functions
- Security-related actions of user
- Import/Export of data from/to Removable Media
What are the Event Detection Criteria?
- Appropriate Hooks must be Available
- Monitoring Software needs to be Added
- Event Recording Function is Needed
- Audit Trail Analysis Software Tools May be Used to Analyze Collected Data
- Additional Security for Auditing Function
- Auditing System Should Have Minimal Effect on Functionality
What are the Implementation Guidelines?
- Agree on Audit Requirements with Management
- Scope of Technical Audit Tests Should be Agreed and Controlled
- Audit Tests should be Limited to Read-only Access to Software and Data
- Excemptions of 3 Should Only be on Isolated Copies of System Files
- Additionaly Requirements for Processing Should be Identified and Agreed
- Auditint Tests that Limit Availability Should be Run Outside Business Hours
- All Access Should be Monitored and Logged
What Should Be Collected in an Auditing Trail?
- Events Related to Use of Auditing Software
- Events Related to Security Mechanisms
- Events Collected for Use By Security Detection and Prevention Mechanisms
- Events Related to System Management and Operation
- Operating System Access
- Application Access of Selected Applications
- Remote Access
What are Physical Access Audit Trails?
Audit Trails Generated By Equipment that Control Physical access
What are the Data of Interest of Physical Access Audit Trails?
- Date/time/location/ of Access
- Valid and Invalid Access Attempts
- Attempts to Add/Modify/Delete Physical Access Privileges
What is a Hook?
Capture Points that Trigger Data Collection and Storage, depends on OS and Applications Involved
What is Contained in an Event Log?
- Numeric Identification Code
- Set of Attributes
- Optional User-supplied Data
What are the 3 Types of Event Logs?
- System
- Application
- Security
What are the Windows Event Categories?
- Account Logon Events
- Account Management
- Directory Service Access
- Logon Events
- Object Access
- Policy Changes
- Privilege Use
What are the UNIX Syslog Elements?
- syslog() : API referenced by several standard system utilities
- logger : Command to add single-line entries to system log
- /etc/syslog.conf : Config file used to control logging and routing of system log events
- syslogd : Daemon to receive/route log events
What is a Syslog Service?
- Means of Capturing Relevant Events
- Storage Facility
- Protocol for Transmitting syslog Messages from Other Machines to a Syslog Server
What Add-on Features Can be Included in the Syslog Service?
- Robust Filtering
- Log Analysis
- Event Response
- Alternative Message Formats
- Log File Encryption
- Database Storage
- Rate Limiting
What is a Syslog Protocol?
Transport Allowing Hosts to Send IP Event Notification Messages to Syslog Servers
What do Messages in the BSD Syslog Format Consist of?
- PRI : facilities/severity code
- Header : timestamp and hostname/IP address
- Msg - program name and content
What are Interposable Libraries?
Allows the generation of audit data without needing to recompile the system libraries or application
What are the Three Types of Interposable Libraries?
- Statistically Linked Libraries
- Statically Linked Shared Libraries
- Dynamicall Linked Shared Libraries
What is a Statically Linked Library?
Separate Copy of the Linked Library function is loaded into the program’s virtual memory
What is a Statically Linked Shared Library?
Referenced Shared Object is Incorporated into the Target Executable at Link Time by the Link Loader
Dynamically Linked Shared Libraries
The linking to shared library routines is deferred until load time
Dynamic Binary Rewriting
Postcompilation technique that directly changes the binary code of executables