SlideShare une entreprise Scribd logo
1  sur  31
Logs & The Law What is Admissible in Court? Dominique Levin, VP Product Management Logs & The Law: What’s Admissible in Court? MGT-4,  June 12, 2006
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Primary Sources Of Data in the Enterprise 10/09/200317:42:57,146.127.94.13,48352,146.127.97.14,909,,,accept,tcp,,,,909,146.127.93.29,,0,,4,3,,' 9Oct2003 17:42:57,accept,labcpngfp3,inbound,eth2c0,0,VPN-1 & FireWall-1,product=VPN-1 & FireWall-1[db_tag={0DE0E532-EEA0-11D7-BDFC-927F5D1DECEC};mgmt= labcpngfp3;date=1064415722;policy_name= Standard],labdragon,48352,146.127.97.14,909, tcp,146.127.93.145,',eth2c0,inbound Oct 9 16:29:49 [146.127.94.4] Oct 09 2003 16:44:50: %PIX-6-302013: Built outbound TCP connection 2245701 for outside:146.127.98.67/1487 (146.127.98.67/1487) to inside:146.127.94.13/42562 (146.127.93.145/42562) 2003-10-20|15:25:52|dragonapp-nids|TCP-SCAN|146.127.94.10|146.127.94.13|0|0|X|------S-|0|total=484,min=1,max=1024,up=246,down=237,flags=------S-,Oct20-15:25:34,Oct20-15:25:52| Oct 20 15:35:08 labsnort snort: [1:1421:2] SNMP AgentX/tcp request [Classification: Attempted Information Leak] [Priority: 2]: {TCP} 146.127.94.10:43355 -> 146.127.94.13:705 SENSORDATAID="138715" SENSORNAME="146.127.94.23:network_sensor_1" ALERTID="QPQVIOAJKBNC6OONK6FTNLLESZ" LOCALTIMEZONEOFFSET="14400" ALERTNAME="pcAnywhere_Probe“ ALERTDATETIME="2003-10-20 19:35:21.0" SRCADDRESSNAME="146.127.94.10" SOURCEPORT="42444" INTRUDERPORT="42444" DESTADDRESSNAME="146.127.94.13" VICTIMPORT="5631" ALERTCOUNT="1" ALERTPRIORITY="3" PRODUCTID="3" PROTOCOLID="6" REASON="RSTsent" 2003-10-20|15:25:52|dragonapp-nids|TCP-SCAN|146.127.94.10|146.127.94.13|0|0|X|------S-|0|total=484,min=1,max=1024,up=246,down=237,flags=------S-,Oct20-15:25:34,Oct20-15:25:52| Oct 20 15:35:08 labsnort snort: [1:1421:2] SNMP AgentX/tcp request [Classification: Attempted Information Leak] [Priority: 2]: {TCP} 146.127.94.10:43355 -> 146.127.94.13:705 Systems Structured Unstructured
Log Data is 30% of all Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Systems 30% of all data
Logs are a Fingerprint User and System Activity Privileges Assigned/Changed Customer Transaction Email BCC Failed Logon Security Breach File Up/Download Credit Card Data Access Information Leak
Logs Can Tell You Who Is Doing What … ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Many Precedents For Using Logs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preparedness is the Best Defense “ Unfortunately, that [no log data being available] happens more often than I would like… If your home had been robbed, you would have to tell the police office what was stolen and how the burglar got in. The same is also true for the network. If you simply tell us you have been broken into, and have no evidence to support it, we may be empathetic, but we can’t open a case.”   Shelagh Sayers, special agent, FBI, San Francisco
You have Legal Obligations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Layers Of Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Best Practices Recommend Log Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Federal, State & Intl’ Laws Impacting Log Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Log Lies, Myths & Rumor… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Immutable Logs Matter ,[object Object],[object Object],[object Object],“ When audited logs are immutable and cannot be altered, there are additional advantages for deterrence and proof of policy or legal violations With immutability, deterrence may be improved for all users of the system.”   Markle Foundation Implementing a Trusted Information Sharing Environment February, 2006
Overcoming Admissibility Hurdles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ten Steps To Immutable Logs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ten Steps To Immutable Logs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Things to Avoid ,[object Object],[object Object],[object Object],[object Object],[object Object]
Clear Benefits “ With forensically sounds logs, companies can reduce the potential of loosing a lawsuit, diminish the costs associated with discovery and defense, increase the likelihood of forcing an opponent into settlement, and be a resource to define against actions related to corporate governance.”   Erin Kenneally FSA Times The Institute of Internal Auditors
Reducing Costs of Compliance Guillermo Kopp Vice President Cross-Industry Compliance Costs (USD in Billions) 40% 60% 84% 16% 85% 15% TACTICAL APPROACH REGULATORY  ONSLAUGHT AUTOMATION Source: TowerGroup
Log Management & Intelligence Real-Time Analysis Historical Archives Complete Aggregation Automation Of Collection Processes & Controls
High-Performance Architecture for Global 2000 Best Practices Reports and Alerts  Business Policies and IT Controls Definition IT Controls - Policy Statements Import Compliance Reports and Alerts Export 100% Message Collection. 100% Pure Storage. Behavioral Alerts. Compliance Reports. Real-time Search.   Only the CEO should access this data What  should be happening? Who is actually accessing this data? What  is  happening? Backup Software SAN/NAS Storage Enterprise Apps Mail Servers Proxy Servers Win/Linux Servers Network Devices Security Devices CEO COO CSO CIO HR Customer Legal BOD Operations Network Security Datacenter Audit
Architecting to meet Legal Obligations Disaster Recovery Site Main Data Center Existing Networked Storage Remote Office Remote Office Remote Office ST 2000 Raw Logs raw logs LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs NTP Server Microsecond accuracy: for example 30.123456 seconds
Securing Log Data Transport Disaster Recovery Site Main Data Center Existing Networked Storage Remote Office Remote Office Remote Office ST 2000 Raw Logs raw logs LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs Encryption, Authentication, TCP, Compression. Buffer in case of  WAN  Failure.
Avoid Collusion with Distributed Log Storage Disaster Recovery Site Main Data Center Existing Networked Storage Remote Office Remote Office Remote Office ST 2000 Raw Logs raw logs Off-site storage in 2 places: requires multi-party conspiracy to alter logs. LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs
Perform Analysis on a Copy of the Log Data Disaster Recovery Site Management Station SOAP Request XML Responses Main Data Center Existing Networked Storage raw logs ST 2000 Raw Logs Remote Office Remote Office Remote Office Raw Logs Log Analysis LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs
Make Archives Tamper Proof with Hashing Each 1 minute file has it’s  own hash file.
No Human Intervention: Auto-Retention Settings Logs get deleted by software automatically, not by users.
Store Logs on WORM or encrypted device ,[object Object],[object Object],ST 2000 raw logs LX 2000 metalogs ST 2000 raw logs LX 2000 metalogs NAS NetApp Decru.
Take Action! ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You!  Join us for a demo!   http://www.loglogic.com/resources/screencasts/   loglogic.com blog.loglogic.com  Automating Compliance. Mitigating Risk.

Contenu connexe

Tendances

Active directory
Active directory Active directory
Active directory
deshvikas
 
How to configure dns server(2)
How to configure dns server(2)How to configure dns server(2)
How to configure dns server(2)
Amandeep Kaur
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDS
Harsh Sethi
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
Touhidul Fahim
 
Internet Protocol Detail Record
Internet Protocol Detail RecordInternet Protocol Detail Record
Internet Protocol Detail Record
devalnaik
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensics
sdavis532
 

Tendances (20)

File Carving
File CarvingFile Carving
File Carving
 
Active directory
Active directory Active directory
Active directory
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmission
 
How to configure dns server(2)
How to configure dns server(2)How to configure dns server(2)
How to configure dns server(2)
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDS
 
DNS Configuration
DNS ConfigurationDNS Configuration
DNS Configuration
 
Squid
SquidSquid
Squid
 
Comptia Network+
Comptia Network+Comptia Network+
Comptia Network+
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Ch1
Ch1Ch1
Ch1
 
Internet Protocol Detail Record
Internet Protocol Detail RecordInternet Protocol Detail Record
Internet Protocol Detail Record
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensics
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical Layer
 
Gsm radio-interface
Gsm radio-interfaceGsm radio-interface
Gsm radio-interface
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Nzitf Velociraptor Workshop
Nzitf Velociraptor WorkshopNzitf Velociraptor Workshop
Nzitf Velociraptor Workshop
 

En vedette

Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courts
Talwant Singh
 

En vedette (20)

Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDF
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courts
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Justice2020
Justice2020Justice2020
Justice2020
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courts
 
Court automation
Court automationCourt automation
Court automation
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICT
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery System
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Report
 
Logs for Information Assurance and Forensics @ USMA
Logs for Information Assurance and Forensics @ USMALogs for Information Assurance and Forensics @ USMA
Logs for Information Assurance and Forensics @ USMA
 
Court Case Management System
Court Case Management SystemCourt Case Management System
Court Case Management System
 
E courts project
E courts projectE courts project
E courts project
 

Similaire à Logs & The Law: What is Admissible in Court?

Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
CTIN
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
 

Similaire à Logs & The Law: What is Admissible in Court? (20)

Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Management
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository
 
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A ProductBrian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
 
EDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records ManagementEDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records Management
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
What Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorWhat Every Organization Should Log And Monitor
What Every Organization Should Log And Monitor
 
Logs = Accountability
Logs = AccountabilityLogs = Accountability
Logs = Accountability
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
 
Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Paul Johnson
Paul JohnsonPaul Johnson
Paul Johnson
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011
 
Log Management For e-Discovery, Database Monitoring and Other Unusual Uses
Log Management For e-Discovery, Database Monitoring and Other Unusual UsesLog Management For e-Discovery, Database Monitoring and Other Unusual Uses
Log Management For e-Discovery, Database Monitoring and Other Unusual Uses
 

Dernier

Dernier (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Logs & The Law: What is Admissible in Court?

  • 1. Logs & The Law What is Admissible in Court? Dominique Levin, VP Product Management Logs & The Law: What’s Admissible in Court? MGT-4, June 12, 2006
  • 2.
  • 3. Primary Sources Of Data in the Enterprise 10/09/200317:42:57,146.127.94.13,48352,146.127.97.14,909,,,accept,tcp,,,,909,146.127.93.29,,0,,4,3,,' 9Oct2003 17:42:57,accept,labcpngfp3,inbound,eth2c0,0,VPN-1 & FireWall-1,product=VPN-1 & FireWall-1[db_tag={0DE0E532-EEA0-11D7-BDFC-927F5D1DECEC};mgmt= labcpngfp3;date=1064415722;policy_name= Standard],labdragon,48352,146.127.97.14,909, tcp,146.127.93.145,',eth2c0,inbound Oct 9 16:29:49 [146.127.94.4] Oct 09 2003 16:44:50: %PIX-6-302013: Built outbound TCP connection 2245701 for outside:146.127.98.67/1487 (146.127.98.67/1487) to inside:146.127.94.13/42562 (146.127.93.145/42562) 2003-10-20|15:25:52|dragonapp-nids|TCP-SCAN|146.127.94.10|146.127.94.13|0|0|X|------S-|0|total=484,min=1,max=1024,up=246,down=237,flags=------S-,Oct20-15:25:34,Oct20-15:25:52| Oct 20 15:35:08 labsnort snort: [1:1421:2] SNMP AgentX/tcp request [Classification: Attempted Information Leak] [Priority: 2]: {TCP} 146.127.94.10:43355 -> 146.127.94.13:705 SENSORDATAID="138715" SENSORNAME="146.127.94.23:network_sensor_1" ALERTID="QPQVIOAJKBNC6OONK6FTNLLESZ" LOCALTIMEZONEOFFSET="14400" ALERTNAME="pcAnywhere_Probe“ ALERTDATETIME="2003-10-20 19:35:21.0" SRCADDRESSNAME="146.127.94.10" SOURCEPORT="42444" INTRUDERPORT="42444" DESTADDRESSNAME="146.127.94.13" VICTIMPORT="5631" ALERTCOUNT="1" ALERTPRIORITY="3" PRODUCTID="3" PROTOCOLID="6" REASON="RSTsent" 2003-10-20|15:25:52|dragonapp-nids|TCP-SCAN|146.127.94.10|146.127.94.13|0|0|X|------S-|0|total=484,min=1,max=1024,up=246,down=237,flags=------S-,Oct20-15:25:34,Oct20-15:25:52| Oct 20 15:35:08 labsnort snort: [1:1421:2] SNMP AgentX/tcp request [Classification: Attempted Information Leak] [Priority: 2]: {TCP} 146.127.94.10:43355 -> 146.127.94.13:705 Systems Structured Unstructured
  • 4.
  • 5. Logs are a Fingerprint User and System Activity Privileges Assigned/Changed Customer Transaction Email BCC Failed Logon Security Breach File Up/Download Credit Card Data Access Information Leak
  • 6.
  • 7.
  • 8. Preparedness is the Best Defense “ Unfortunately, that [no log data being available] happens more often than I would like… If your home had been robbed, you would have to tell the police office what was stolen and how the burglar got in. The same is also true for the network. If you simply tell us you have been broken into, and have no evidence to support it, we may be empathetic, but we can’t open a case.” Shelagh Sayers, special agent, FBI, San Francisco
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Clear Benefits “ With forensically sounds logs, companies can reduce the potential of loosing a lawsuit, diminish the costs associated with discovery and defense, increase the likelihood of forcing an opponent into settlement, and be a resource to define against actions related to corporate governance.” Erin Kenneally FSA Times The Institute of Internal Auditors
  • 20. Reducing Costs of Compliance Guillermo Kopp Vice President Cross-Industry Compliance Costs (USD in Billions) 40% 60% 84% 16% 85% 15% TACTICAL APPROACH REGULATORY ONSLAUGHT AUTOMATION Source: TowerGroup
  • 21. Log Management & Intelligence Real-Time Analysis Historical Archives Complete Aggregation Automation Of Collection Processes & Controls
  • 22. High-Performance Architecture for Global 2000 Best Practices Reports and Alerts Business Policies and IT Controls Definition IT Controls - Policy Statements Import Compliance Reports and Alerts Export 100% Message Collection. 100% Pure Storage. Behavioral Alerts. Compliance Reports. Real-time Search. Only the CEO should access this data What should be happening? Who is actually accessing this data? What is happening? Backup Software SAN/NAS Storage Enterprise Apps Mail Servers Proxy Servers Win/Linux Servers Network Devices Security Devices CEO COO CSO CIO HR Customer Legal BOD Operations Network Security Datacenter Audit
  • 23. Architecting to meet Legal Obligations Disaster Recovery Site Main Data Center Existing Networked Storage Remote Office Remote Office Remote Office ST 2000 Raw Logs raw logs LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs NTP Server Microsecond accuracy: for example 30.123456 seconds
  • 24. Securing Log Data Transport Disaster Recovery Site Main Data Center Existing Networked Storage Remote Office Remote Office Remote Office ST 2000 Raw Logs raw logs LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs Encryption, Authentication, TCP, Compression. Buffer in case of WAN Failure.
  • 25. Avoid Collusion with Distributed Log Storage Disaster Recovery Site Main Data Center Existing Networked Storage Remote Office Remote Office Remote Office ST 2000 Raw Logs raw logs Off-site storage in 2 places: requires multi-party conspiracy to alter logs. LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs
  • 26. Perform Analysis on a Copy of the Log Data Disaster Recovery Site Management Station SOAP Request XML Responses Main Data Center Existing Networked Storage raw logs ST 2000 Raw Logs Remote Office Remote Office Remote Office Raw Logs Log Analysis LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs
  • 27. Make Archives Tamper Proof with Hashing Each 1 minute file has it’s own hash file.
  • 28. No Human Intervention: Auto-Retention Settings Logs get deleted by software automatically, not by users.
  • 29.
  • 30.
  • 31. Thank You! Join us for a demo! http://www.loglogic.com/resources/screencasts/ loglogic.com blog.loglogic.com Automating Compliance. Mitigating Risk.

Notes de l'éditeur

  1. 08/19/09
  2. 08/19/09
  3. 08/19/09
  4. 08/19/09
  5. 08/19/09
  6. 08/19/09
  7. 08/19/09
  8. 08/19/09
  9. 08/19/09
  10. 08/19/09
  11. 08/19/09
  12. 08/19/09
  13. 08/19/09
  14. 08/19/09
  15. 08/19/09
  16. 08/19/09
  17. 08/19/09
  18. 08/19/09
  19. 08/19/09
  20. 08/19/09