Global Research Syndicate
No Result
View All Result
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
No Result
View All Result
globalresearchsyndicate
No Result
View All Result
Home Data Collection

5 Often-Overlooked Log Sources | CSO Online

globalresearchsyndicate by globalresearchsyndicate
February 23, 2021
in Data Collection
0
5 Often-Overlooked Log Sources | CSO Online
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

All logs are not created equal. Common logs from servers and firewalls are fairly easily ingested and parsed, while DNS or physical security logs are much tougher to manage at scale, and block visibility into the security environment. The challenging logs are more likely to be skipped: According to a 451 Research survey of 150 large enterprises, security information and event management (SIEM) platforms only ingest logs from about 45% of their organizations’ log-producing systems.

But whether logs are a slam-dunk to ingest or demand more time and attention, security teams should consider logging often-overlooked sources that are valuable for threat hunting exercises. Here are five log sources that deserve a second look, along with suggestions for maneuvering around the challenges.

  1. Domain Name System (DNS) Logs

Logs from DNS servers provide a wealth of information about which sites users visit, and whether malicious applications are reaching out to command-and-control sites. DNS has also been successfully used as a tunneling protocol for exfiltrating data since firewalls typically allow it out.

However, DNS logs are challenging to work with because of the volume of data and their multi-line format. Consider using Microsoft’s Analytical Event Logging method, which uses a more standard logging format, instead of the old method of turning on debugging and importing the flat file.

Take it one step further: Check out ReliaQuest’s threat hunting use case to learn how to leverage DNS logs for threat hunting. 

  1. Cloud Platform Logs

Many cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) don’t have consistent logging formats. For this reason, your security team will need different parsers or methods of logging events from each platform’s various applications.

Cloud Application Security Broker (CASB) solutions, which sit between cloud service users and cloud applications, provide granular auditing capabilities at the application or service level. If your team is using a CASB, the solution needs to have the same logging and monitoring considerations as the full cloud platforms.

  1. Database Logs

Database auditing and logging can be a stumbling block, since database administrators often don’t want to enable features that could affect server performance. Also, auditing individual databases and tables is difficult given the large number of database servers in a normal enterprise environment.

To gain visibility into these databases without enabling auditing functions on database tables, you can try these two options:

  • If Database Activity Monitoring (DAM) is present, ingest and correlate built-in rules and alerts into the SIEM, since it performs many of the same restrictive functions as a firewall or web application firewall.
  • Create stored procedures that watch for specific actions, such as unencrypted PII stored in a field every 30 minutes, and write an event log with the record ID, date, and time to trigger an alert. These scripts are low-impact and can look for specific scenarios, unlike the all-or-nothing approach for table auditing.
  1. Web Server Logs

According to vulnerability- and exploit-tracking efforts such as the annual Verizon Data Breach Investigations Report, most breaches trace back to holes in public-facing web applications, such as the log sources into which teams have the least visibility. That’s a problem, because web applications often have access to highly sensitive customer account information.

Parsing web server logs is challenging because they’re often in a multi-line or custom format, and possibly logged in a non-standard way to a text file or database versus the native web server log, such as Internet Information Services (IIS) or Apache. If you’re using standard web server logs, enable all the relevant fields since the default W3C layout in IIS doesn’t capture some critical elements, such as page size and cookie values.

  1. Physical Security Logs

Obtaining event logs from physical security applications such as camera systems, biometric/card access readers, or alarm systems is highly valuable for cases involving insider threats – especially when combined with evidence correlated from workstations, firewalls, and remote access devices to pinpoint a person’s location. However, physical security teams and IT security teams often work separately, and many access control systems operate on closed legacy systems.

To work around these challenges, try to limit focus on logs for these events:

  • Remote login with corresponding badge entries
  • Unauthorized physical access to remote, unmanned facilities
  • Audit of authorized employees accessing potentially unauthorized areas of the company
  • Excessive biometric or card failures
  • Visitor/contractor access to unauthorized areas
  • After-hours alarm triggers or excessive open-door time alerts

Ingesting the log sources above is an important step toward improving visibility into the enterprise security environment. Ask your security team to work with data and application owners ahead of time so you can review actionable event types together, and see which elements the source owners might need visibility into as well.

Need more guidance on ingesting these logs? Download the ReliaQuest paper, Top 5 Log Sources You Should Be Ingesting but Probably Aren’t.

Joe Partlow, ReliaQuest CTO, currently oversees all new research and development efforts and new product initiatives. He has been involved with Infosec in some capacity or role for over 20 years, mostly on the defensive side but always impressed by offensive tactics. Current projects and interests include data analytics at scale, forensics, threat, security metrics and automation, red/purple teaming, and artificial intelligence. Outside of Information Security, he has been involved in many other areas of the business including Web Development, Business Intelligence, Database Administration, Project Management, IT, and Operations. He has experience in many different business verticals including retail, healthcare, financial, state/local government, and the Department of Defense. He is also a regular speaker and contributor at security conferences, groups, and associations. 

Copyright © 2021 IDG Communications, Inc.

Related Posts

Years without ice are becoming more frequent, with potentially troubling consequences for local communities and lake ecosystems — ScienceDaily
Data Collection

Extreme melt on Antarctica’s George VI ice shelf — ScienceDaily

February 25, 2021
Shifting ground | Science
Data Collection

Shifting ground | Science

February 25, 2021
Gavin Newsom’s Record, Authenticity Best Focus Points for Recall Challengers, Strategists Say
Data Collection

Gavin Newsom’s Record, Authenticity Best Focus Points for Recall Challengers, Strategists Say

February 25, 2021
Steep Job Losses in California, Home to the Largest Creative Economy in the US, Spell Trouble for the Rest of the Country, a Report Says
Data Collection

Steep Job Losses in California, Home to the Largest Creative Economy in the US, Spell Trouble for the Rest of the Country, a Report Says

February 25, 2021
Home Fitness App Market with Future Prospects, Key Player SWOT Analysis and Forecast To 2025
Data Collection

Data Connection Based on Silicon Photonics Market Research Growth by Manufacturers, Regions, Type and Application, Forecast Analysis to 2025

February 25, 2021
Yes, MBS Have Definitely Been Outperforming Treasuries In General
Data Collection

Ops, MLO Jobs; Cap. Mkts., Valuation, Default, Fulfillment Tools; Technology and Processing Notes

February 25, 2021
Next Post
Medical Imaging Market Valuation to Reach USD 45,719.65 Million by 2025 at 6.52% CAGR, Estimates Market Research Future (MRFR)

Pregnancy Pillows Market Valued 475.9 Million in 2018 and Predicted to Grow at 2.9% CAGR from 2019 to 2025, Asserts Market Research Future (MRFR)

Categories

  • Consumer Research
  • Data Analysis
  • Data Collection
  • Industry Research
  • Latest News
  • Market Insights
  • Marketing Research
  • Survey Research
  • Uncategorized

Recent Posts

  • Sugar Centrifugal Screens Market Overview On Research Methodology (Primary Research, Secondary Research And Company Share Analysis Model Etc) 2021-2027
  • Industrial Ventilation Fans Market Overview On Research Methodology (Primary Research, Secondary Research And Company Share Analysis Model Etc) 2021-2027
  • Extreme melt on Antarctica’s George VI ice shelf — ScienceDaily
  • Privacy Policy
  • Terms of Use
  • Antispam
  • DMCA
  • Contact Us

Copyright © 2021 Globalresearchsyndicate.com

No Result
View All Result
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights

Copyright © 2021 Globalresearchsyndicate.com

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In