GLOBAL RESEARCH SYNDICATE
No Result
View All Result
  • Login
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
No Result
View All Result
globalresearchsyndicate
No Result
View All Result
Home Data Collection

5 Often-Overlooked Log Sources | CSO Online

globalresearchsyndicate by globalresearchsyndicate
February 23, 2021
in Data Collection
0
5 Often-Overlooked Log Sources | CSO Online
0
SHARES
9
VIEWS
Share on FacebookShare on Twitter

All logs are not created equal. Common logs from servers and firewalls are fairly easily ingested and parsed, while DNS or physical security logs are much tougher to manage at scale, and block visibility into the security environment. The challenging logs are more likely to be skipped: According to a 451 Research survey of 150 large enterprises, security information and event management (SIEM) platforms only ingest logs from about 45% of their organizations’ log-producing systems.

But whether logs are a slam-dunk to ingest or demand more time and attention, security teams should consider logging often-overlooked sources that are valuable for threat hunting exercises. Here are five log sources that deserve a second look, along with suggestions for maneuvering around the challenges.

  1. Domain Name System (DNS) Logs

Logs from DNS servers provide a wealth of information about which sites users visit, and whether malicious applications are reaching out to command-and-control sites. DNS has also been successfully used as a tunneling protocol for exfiltrating data since firewalls typically allow it out.

However, DNS logs are challenging to work with because of the volume of data and their multi-line format. Consider using Microsoft’s Analytical Event Logging method, which uses a more standard logging format, instead of the old method of turning on debugging and importing the flat file.

Take it one step further: Check out ReliaQuest’s threat hunting use case to learn how to leverage DNS logs for threat hunting. 

  1. Cloud Platform Logs

Many cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) don’t have consistent logging formats. For this reason, your security team will need different parsers or methods of logging events from each platform’s various applications.

Cloud Application Security Broker (CASB) solutions, which sit between cloud service users and cloud applications, provide granular auditing capabilities at the application or service level. If your team is using a CASB, the solution needs to have the same logging and monitoring considerations as the full cloud platforms.

  1. Database Logs

Database auditing and logging can be a stumbling block, since database administrators often don’t want to enable features that could affect server performance. Also, auditing individual databases and tables is difficult given the large number of database servers in a normal enterprise environment.

To gain visibility into these databases without enabling auditing functions on database tables, you can try these two options:

  • If Database Activity Monitoring (DAM) is present, ingest and correlate built-in rules and alerts into the SIEM, since it performs many of the same restrictive functions as a firewall or web application firewall.
  • Create stored procedures that watch for specific actions, such as unencrypted PII stored in a field every 30 minutes, and write an event log with the record ID, date, and time to trigger an alert. These scripts are low-impact and can look for specific scenarios, unlike the all-or-nothing approach for table auditing.
  1. Web Server Logs

According to vulnerability- and exploit-tracking efforts such as the annual Verizon Data Breach Investigations Report, most breaches trace back to holes in public-facing web applications, such as the log sources into which teams have the least visibility. That’s a problem, because web applications often have access to highly sensitive customer account information.

Parsing web server logs is challenging because they’re often in a multi-line or custom format, and possibly logged in a non-standard way to a text file or database versus the native web server log, such as Internet Information Services (IIS) or Apache. If you’re using standard web server logs, enable all the relevant fields since the default W3C layout in IIS doesn’t capture some critical elements, such as page size and cookie values.

  1. Physical Security Logs

Obtaining event logs from physical security applications such as camera systems, biometric/card access readers, or alarm systems is highly valuable for cases involving insider threats – especially when combined with evidence correlated from workstations, firewalls, and remote access devices to pinpoint a person’s location. However, physical security teams and IT security teams often work separately, and many access control systems operate on closed legacy systems.

To work around these challenges, try to limit focus on logs for these events:

  • Remote login with corresponding badge entries
  • Unauthorized physical access to remote, unmanned facilities
  • Audit of authorized employees accessing potentially unauthorized areas of the company
  • Excessive biometric or card failures
  • Visitor/contractor access to unauthorized areas
  • After-hours alarm triggers or excessive open-door time alerts

Ingesting the log sources above is an important step toward improving visibility into the enterprise security environment. Ask your security team to work with data and application owners ahead of time so you can review actionable event types together, and see which elements the source owners might need visibility into as well.

Need more guidance on ingesting these logs? Download the ReliaQuest paper, Top 5 Log Sources You Should Be Ingesting but Probably Aren’t.

Joe Partlow, ReliaQuest CTO, currently oversees all new research and development efforts and new product initiatives. He has been involved with Infosec in some capacity or role for over 20 years, mostly on the defensive side but always impressed by offensive tactics. Current projects and interests include data analytics at scale, forensics, threat, security metrics and automation, red/purple teaming, and artificial intelligence. Outside of Information Security, he has been involved in many other areas of the business including Web Development, Business Intelligence, Database Administration, Project Management, IT, and Operations. He has experience in many different business verticals including retail, healthcare, financial, state/local government, and the Department of Defense. He is also a regular speaker and contributor at security conferences, groups, and associations. 

Copyright © 2021 IDG Communications, Inc.

Related Posts

How Machine Learning has impacted Consumer Behaviour and Analysis
Consumer Research

How Machine Learning has impacted Consumer Behaviour and Analysis

January 4, 2024
Market Research The Ultimate Weapon for Business Success
Consumer Research

Market Research: The Ultimate Weapon for Business Success

June 22, 2023
Unveiling the Hidden Power of Market Research A Game Changer
Consumer Research

Unveiling the Hidden Power of Market Research: A Game Changer

June 2, 2023
7 Secrets of Market Research Gurus That Will Blow Your Mind
Consumer Research

7 Secrets of Market Research Gurus That Will Blow Your Mind

May 8, 2023
The Shocking Truth About Market Research Revealed!
Consumer Research

The Shocking Truth About Market Research: Revealed!

April 25, 2023
market research, primary research, secondary research, market research trends, market research news,
Consumer Research

Quantitative vs. Qualitative Research. How to choose the Right Research Method for Your Business Needs

March 14, 2023
Next Post
Medical Imaging Market Valuation to Reach USD 45,719.65 Million by 2025 at 6.52% CAGR, Estimates Market Research Future (MRFR)

Pregnancy Pillows Market Valued 475.9 Million in 2018 and Predicted to Grow at 2.9% CAGR from 2019 to 2025, Asserts Market Research Future (MRFR)

Categories

  • Consumer Research
  • Data Analysis
  • Data Collection
  • Industry Research
  • Latest News
  • Market Insights
  • Marketing Research
  • Survey Research
  • Uncategorized

Recent Posts

  • Ipsos Revolutionizes the Global Market Research Landscape
  • How Machine Learning has impacted Consumer Behaviour and Analysis
  • Market Research: The Ultimate Weapon for Business Success
  • Privacy Policy
  • Terms of Use
  • Antispam
  • DMCA

Copyright © 2024 Globalresearchsyndicate.com

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights

Copyright © 2024 Globalresearchsyndicate.com