An audit trail is a series of  records of computer events, about an operating system, an application, or user  activities.  A computer system may have  several audit trails, each devoted to a particular type of activity. 
Auditing is the review and analysis  of management, operational, and technical controls.  The auditor can obtain valuable information  about activity on a computer system from the audit trail.  Audit trails improve the auditability of the computer system.  Auditing is discussed in the assurance  chapter.
Audit trails maintain a record of  system activity both by system and application processes and by user activity of  systems and applications. In conjunction with appropriate tools and procedures,  audit trails can assist in detecting security violations, performance problems,  and flaws in applications. 
An audit trail should include  sufficient information to establish what events occurred and who (or what)  caused them.  In general, an event record  should specify when the event occurred, the user ID associated with the event,  the program or command used to initiate the event, and the result.  Date and time can help determine if the user  was a masquerader or the actual person specified.  
Audit trails may be used as either a  support for regular system operations or a kind of insurance policy or as both  of these.  As insurance, audit trails are  maintained but are not used unless needed, such as after a system outage.  As a support for operations, audit trails are  used to help system administrators ensure that the system or resources have not  been harmed by hackers, insiders, or technical problems.
An event is any action that happens on a  computer system.  Examples include  logging into a system, executing a program, and opening a file.
Audit trails can provide a means to  help accomplish several security-related objectives,  including individual accountability, reconstruction of events, intrusion  detection, and problem analysis. 
Audit trails are a technical  mechanism that help managers maintain individual accountability.  By advising users that they are personally  accountable for their actions, which are tracked by an audit trail that logs  user activities, managers can help promote proper user behavior. Users are less  likely to attempt to circumvent security policy if they know that their actions  will be recorded in an audit log.
Audit trails work in concert with  logical access controls, which restrict use of system resources. For example,  audit trails can be used in concert with access controls to identify and provide  information about users suspected of improper modification of data (e.g.,  introducing errors into a database).  An  audit trail may record "before" and "after" versions of records.  (Depending upon the size of the file and the  capabilities of the audit logging tools, this may be very  resource-intensive.)  Comparisons can  then be made between the actual changes made to records and what was  expected.  This can help management  determine if errors were made by the user, by the system or application  software, or by some other source.
In  conjunction with appropriate tools and procedures, audit trails can provide a  means to help accomplish several security-related objectives, including  individual accountability, reconstruction of events, intrusion detection, and  problem identification.  A list of items  to consider to put in place  for the audit trail mechanisms are:
- Does the audit trail support accountability by providing a trace of user actions?
- Can the audit trail support after-the-fact investigations of how, when, and why normal operations ceased?
- Are audit trails designed and implemented to record appropriate information that can assist in intrusion detection?
- Are audit trails used as online tools to help identify problems other than intrusions as they occur?
- Does the audit trail include sufficient information  to establish what events occurred and who (or what) caused them?  In general, an event record should  specify:- Type of   event;
- When the event   occurred;
- User ID associated with the event; and
- Program or command used to initiate the event.
 
- Type of   event;
- Is access to online audit logs strictly controlled?
- Is there separation of duties between security personnel who administer the access control function and those who administer the audit trail?
- Is the confidentiality of audit trail information protected if, for example, it records personal information about users?
- Describe how frequently audit trails are reviewed and whether there are review guidelines.
- Can the audit trail be queried by user ID, terminal ID, application name, date and time, or some other set of parameters to run reports of selected information?
- Does the appropriate system-level or application-level administrator review the audit trails following a known system or application software problem, a known violation of existing requirements by a user, or some unexplained system or user problem?
- Audit analysis tools, such as those based on audit  reduction, attack signature, and variance techniques, can be used in a real-time  or near real-time fashion. Does the organization use the many types of tools  that have been developed to help reduce the amount of information contained in  audit records, as well as to distill useful information from the raw data?
Audit trails can also be used to  reconstruct events after a problem has occurred.  Damage can be more easily assessed by  reviewing audit trails of system activity to pinpoint how, when, and why normal  operations ceased.  Audit trail analysis  can often distinguish between operator-induced errors (during which the system  may have performed exactly as instructed) or system-created errors (e.g.,  arising from a poorly tested piece of replacement code).  If, for example, a system fails or the  integrity of a file (either program or data) is questioned, an analysis of the  audit trail can reconstruct the series of steps taken by the system, the users,  and the application.  Knowledge of the  conditions that existed at the time of, for example, a system crash, can be  useful in avoiding future outages.   Additionally, if a technical problem occurs (e.g., the corruption of a  data file) audit trails can aid in the recovery process (e.g., by using the  record of changes made to reconstruct the file). 
If audit trails have been designed  and implemented to record appropriate information, they can assist in intrusion detection.  Although normally thought of as a real-time  effort, intrusions can be detected in real time, by examining audit records  as they are created (or through the use of other kinds of warning  flags/notices), or after the fact (e.g., by examining audit  records in a batch process).   
Real-time intrusion detection is  primarily aimed at outsiders attempting to gain unauthorized access to the  system.  It may also be used to detect  changes in the system's performance indicative of, for example, a virus or worm  attack.  There may be difficulties in  implementing real-time auditing, including unacceptable system performance.
After-the-fact identification may  indicate that unauthorized access was attempted (or was successful).  Attention can then be given to damage  assessment or reviewing controls that were attacked.
Audit trails may also be used as  on-line tools to help identify problems other than intrusions as they  occur.  This is often referred to as real-time  auditing or monitoring.  If a  system or application is deemed to be critical to an organization's business or  mission, real-time auditing may be implemented to monitor the status of these  processes (although, as noted above, there can be difficulties with real-time  analysis).  An analysis of the audit  trails may be able to verify that the system operated normally (i.e., that an  error may have resulted from operator error, as opposed to a system-originated  error).  Such use of audit trails may be  complemented by system performance logs.   For example, a significant increase in the use of system resources (e.g.,  disk file space or outgoing modem use) could indicate a security problem.  
Review of Audit Trails  
Audit trails can be used to review  what occurred after an event, for periodic reviews, and for real-time  analysis.  Reviewers should know what to  look for to be effective in spotting unusual activity.  They need to understand what normal activity  looks like.  Audit trail review can be  easier if the audit trail function can be queried by user ID, terminal ID,  application name, date and time, or some other set of parameters to run reports  of selected information.
Audit Trail  Review After an Event.  Following a  known system or application software problem, a known violation of existing  requirements by a user, or some unexplained system or user problem, the  appropriate system-level or application-level administrator should review the  audit trails.  Review by the  application/data owner would normally involve a separate report, based upon  audit trail data, to determine if their resources are being misused.  
Periodic Review  of Audit Trail Data.  Application  owners, data owners, system administrators, data processing function managers,  and computer security managers should determine how much review of audit trail  records is necessary, based on the importance of identifying unauthorized  activities.  This determination should  have a direct correlation to the frequency of periodic reviews of audit trail  data. 
Real-Time Audit Analysis. Traditionally, audit trails are analyzed in a batch mode at regular intervals (e.g., daily). Audit records are archived during that interval for later analysis. Audit analysis tools can also be used in a real-time, or near real-time fashion. Such intrusion detection tools are based on audit reduction, attack signature, and variance techniques. Manual review of audit records in realtime is almost never feasible on large multiuser systems due to the volume of records generated. However, it might be possible to view all records associated with a particular user or application, and view them in real time
 
 
 

No comments:
Post a Comment