You are on page 1of 14

Best Practices Guide for IT

Governance & Compliance


Assess, Audit/Alert and Remediate

Summary a compliance solution that will minimize stress during an


Federal regulations, such as the Sarbanes-Oxley Act (SOX), the organization’s next IT compliance audit.
Health Insurance Portability Accountability Act (HIPAA), and
the more recent Payment Card Industry (PCI) initiative, require While this paper is focused primarily on external regulations
businesses to know exactly what changes are being made to that apply to organizations based in the United States or
structured and unstructured data in their corporate networks. conducting business in the United States, many international
As a result, IT organizations need to provide more detailed regulations have similar auditing requirements that make a
monitoring, analysis, auditing, and reporting on the changes compelling case for implementing a comprehensive data
being made to this protected data. In fact, auditing of changes protection compliance solution.
made to structured and unstructured data has become a
standard business practice for most companies. Key steps to maintaining compliance
Once an organization has met initial regulatory requirements,
This white paper details three critical steps for maintaining it must continue to comply on an ongoing basis. But most
compliance with external regulations and internal security companies find that the time and manual effort required to
policies: assess the environment and controls; audit and maintain compliance with data protection laws are cost-
alert on unapproved user activity; and develop remediation prohibitive. Thus, automating at least some internal controls is
procedures. Then we discuss four key external regulations no longer optional; it is necessary to maintain compliance.
that are driving companies to prepare for an IT compliance
audit. Finally, we discuss best practices for implementing
When evaluating the automation of their greater control over IT infrastructure and
compliance initiatives, organizations services.
need to focus on three key tasks:
◦◦ Assess Audit/alert
◦◦ Audit/alert Once the baseline for internal controls
◦◦ Remediate has been established, IT organizations
must continually audit the environment
Assess and alert stakeholders to changes from
To give management visibility into the baseline, including violations of
compliance, an organization must corporate policy and security breaches.
assess the internal controls in its IT Alerting provides immediate notification
environment. This assessment process about business-critical offenses and

As the demands includes comparing the organization’s


processes and policies to industry
helps mitigate exposure and risk.

on IT organizations standards and recommendations, such Verizon’s 2012 Data Breach


as security frameworks like COBIT or Investigations Report shows that 97
become ISO 17799 as they relate to specific percent of breaches were avoidable

increasingly regulations. Such an analysis often


results in a well—scoped compliance
through simple or intermediate controls
and that 92 percent of incidents were
complex due to program that is officially recognized by discovered by a third party. Therefore, to
management. mitigate risk, organizations must track
regulatory both user and administrator activity

requirements and The organization also needs to perform


a risk analysis to evaluate which
from logon to logoff, including the
files accessed, the changes made to
other compliance controls it considers essential and permissions, and the changes made to
locate gaps in implementing those established security policies.
mandates, IT must controls. This control identification Auditors look for evidence that a
and prioritization process establishes a company has processes and procedures
implement solutions baseline of controls and aligns it with the in place to audit its users and their

and processes to organization’s compliance objectives as


set forth by the compliance program.
activities. Often auditors will include
“spot checks” in their audits that require
minimize risk and the ability to find specific data or data
Organizations should evaluate the from a specific point in time. Forensic
complexity. following areas: analysis enables organizations to replay
◦◦ User rights throughout the network a violation as it occurred, which helps
◦◦ Group memberships and the access the organization learn how to prevent
privileges they provide the violation from being repeated in the
◦◦ Permissions to access files and folders future.
◦◦ Alternative locations of files, such as
Exchange or SharePoint Audit log management
◦◦ Configuration settings of systems Audit log management is about making
Assessment should be an ongoing sense of the multiple, separate audit
process for any organization since the logs generated within an organization’s
baseline of internal controls will change infrastructure. An effective audit
and require maintenance to meet log management strategy includes
ever-evolving IT requirements. As the managing event logs from servers,
demands on IT organizations become workstations, network devices, and
increasingly complex due to regulatory applications to collect, store, and report
requirements and other compliance on event data.
mandates, IT must implement solutions
and processes to minimize risk and Many companies struggle to glean
complexity. This strategy enables IT meaningful information from their
to function as a viable business unit, event logs that can support auditing
ensure fewer outages, and demonstrate efforts. In most cases, the system

2
Proactive remediation can
administrator must sift through the
also include pre-defined role management,
multitude of event log files using
as well as provisioning and de-provisioning
native operating system tools, which
of accounts, which helps to separate duties
is an extremely time-consuming task
among administrators.
usually performed on a reactive, ad-hoc
basis. These native event viewers are Regulations and corporate
insufficient and not intended to be used compliance
as true event log management solutions
Many government regulations are
because they provide no means of:
designed to govern the practices of
• Collecting event data from multiple
corporations, protect individual’s rights
systems and applications
to privacy, and spur adherence to
• Generating reports to support an audit
standard best practices. The following
• Generating alerts on critical violations to
organizational policies
sections provide a general working An effective audit
knowledge of four key regulations
that affect IT departments in the log management
Effective audit log management
solutions do exist, however, and they will
United States and, to a lesser extent,
international organizations doing
strategy includes
be discussed later.
business in the Unites States: managing event
◦◦ The Health Insurance Portability and
Remediate
Accountability Act (HIPAA) logs from servers,
Many regulations require an organization
◦◦
to have a written remediation policy
◦◦
The Gramm-Leach-Bliley Act (GLBA)
The Sarbanes-Oxley Act (SOX)
workstations,
that specifies the actions that will be
taken in the event of a corporate policy
◦◦ The Payment Card Industry Data Security network devices,
Standard (PCI DSS)
violation. Informing all internal users
of the consequences of a violation
and applications to
can help deter them from committing
Health Insurance Portability and
Accountability Act (HIPAA)
collect, store, and
violations, and specifying the steps to
take in the event of a violation can help
The Health Insurance Portability and report on event data.
Accountability Act was signed into law
minimize its impact. Auditors often look
on August 31, 1996. Virtually all health
at remediation policies very closely; they
care organizations, including health
are a key component of any external
care providers, are affected by HIPAA
audit.
requirements. The intention of HIPAA is
to enforce standards for privacy, security,
At least two forms of remediation are
and electronic interchange of health
available: proactive and reactive.
information. In particular, HIPAA requires
◦◦ Most organizations are reactive.
health care organizations to:
Organizations achieve reactive remediation
◦◦ Ensure the confidentially, integrity, and
by de-provisioning accounts in the event
availability of all electronically protected
of a violation or inappropriate activity,
health information that organizations
automatically disabling an account
create, receive, maintain, or transmit
after a pre-defined action has occurred,
◦◦ Regularly review records of information
or shutting down a server due to an
system activity, such as audit logs,
unapproved change. This type of policy
access reports, and security incident
normally passes an audit because no
tracking reports
IT department can effectively control
◦◦ Establish, document, review, and modify
everything.
a user’s right to access a workstation,
◦◦ Proactive remediation techniques, which
transaction, program, or process
more organizations are beginning to
◦◦ Monitor login attempts and report
implement, prevent unauthorized or
discrepancies
unapproved changes. For example, an
◦◦ Identify, respond to, and document
organization can prevent the modification
security incidents
of business-critical objects in Active
Directory, applications, or systems.

3
HIPAA dictates the use of security process, whereby the condition of a
standards, privacy standards, electronic financial institution’s controls is just one
transaction and code sets, and unique indicator of its overall security posture.
employer identifiers when managing Other indicators include the ability of
and maintaining critical data. While the institution to continually assess
compliance is federally mandated, its posture and react appropriately in
compliance also benefits health care the face of rapidly changing threats,
organizations by providing patients technologies, and other business
with confidence that their sensitive conditions.” Institutions must prove
personal data is safeguarded from their readiness by conducting regular
inappropriate use. self-audits of their enterprises and
documenting the results.

SOX provides With stiff penalties for non-


compliance, health care organizations Sarbanes-Oxley Act (SOX)
additional oversight are aggressively working toward The Sarbanes-Oxley Act was passed
demonstrating HIPAA compliance. in July of 2002 as a direct reaction by
to the audit process Meeting these challenges requires the U.S. Congress to the accounting

and eliminates that IT departments have systems and


processes in place to collect, store,
scandals of late 2001 and early 2002.
SOX provides additional oversight to the
conflicts of interest and report on the events occurring audit process and eliminates conflicts
within their networks, thus creating the of interest by creating a standard set of
by creating a required audit trail. criteria that all publicly held corporations

standard set of Gramm-Leach-Bliley Act (GLBA)


must adhere to in managing their
financial data. It also seeks to advance
criteria that all The Gramm-Leach-Bliley Act was the standards for corporate governance.
signed into law in November of 1999. Record retention is central to SOX. In
publicly held To comply with GLBA, all organizations particular, companies and their auditors

corporations in the financial services industry must


implement a comprehensive security
are required to retain more records than
before, including all documents and
must adhere to program specifying how their customer data that relate to an audit. Fines and
information is protected. In particular, jail terms are imposed for the deliberate
in managing their these organizations must implement: and willful destruction of audit-related
◦◦
financial data. Dual control procedures, separation of
duties (SoD), and employee background
data, and an auditor is responsible for
oversight of the enterprise’s internal
checks for employees with responsibilities documentation surrounding the audit.
for or access to customer information In addition, the Retention of Records
◦◦ Monitoring systems and procedures to Relevant to Audits and Reviews as
detect actual and attempted attacks on, directed by Section 802 of the act
or intrusions into, customer information states that the Securities and Exchange
systems Commission (SEC) will dictate rules and
regulations concerning “the retention of
Compliance with GLBA is regulated records such as work papers, documents
by federal banking agencies, such as that form the basis of an audit or
the Office of the Comptroller of the review, memoranda, correspondence,
Currency and the Federal Deposit communications, other documents and
Insurance Corporation. Because many records (including electronic records)
organizations have already been audited which are created, sent, or received in
and found to be out of compliance, connection with an audit or review and
GLBA was expanded with detailed contain conclusions, opinions, analysis,
instructions for deploying an information or financial data relating to such an audit
security program. In clarifying the or review.”
new guidance, the Federal Financial
Institutions Examination Council Companies with a market capitalization
(FFIEC) states: “Security is an ongoing greater than $75 million were required

4
to comply with these new rules for fiscal If the answer to either of the preceding
years ending on or after November 15, questions is yes, then the organization
2004; other companies have received needs to be compliant with the PCI
extensions. Under the law, the retention DSS regulations. One key poin t to
time for records is generally five understand is that these regulations
years; however, retention periods vary apply equally to organizations of any
according to a number of variables. size, whether they have one employee
IT executives need to formulate and or one million employees.
formalize an enterprise-wide strategy
to best manage such data now and into Key requirements of the PCI DSS
the future to reduce the enterprise’s The PCI DSS version 2.0 took effect on
large exposure and ensure future data Jan 1, 2011, bringing more clarity to
integrity. the existing set of requirements and
introducing new ones. The PCI DSS is
...companies and
Payment Card Industry Data composed of six best-practice areas and their auditors are
Security Standard (PCI DSS) 12 high-level requirements for securing
What Is the PCI DSS? protected data that include strong required to retain
In September of 2006, five payment card
brands (Visa Inc., MasterCard Worldwide,
access controls, user activity monitoring,
change tracking, and record retention.
more records than
American Express, Discover Financial before, including
Services, and JCB International) formed Key requirements of the PCI DSS 2.0 are
the PCI Security Standards Council to outlined below. all documents and
develop a new standard for securing
their customers’ payment card data. The Establish reliable & meaningful
data that relate to an
members of the council jointly require audit trails audit.
all merchants who process payment Today, almost all elements of
card transactions with their brands organizational IT infrastructure—
(credit cards and signature debit cards including operating systems, network
embossed with a council member’s devices, firewalls, databases, and
logo) to comply with the new standard, applications—have some kind of auditing
the Payment Card Industry Data Security built in. However, native audit trails
Standard (PCI DSS). All banks that inherit the following issues that are
process payment transactions associated difficult to manage:
with these cards are responsible for ◦◦ Unmanageable volume of generated
ensuring their merchants meet the events —In a typical IT environment,
standard, and penalties for failing to the various systems log gigabytes of
comply with the standard can be severe. event data daily and provide no native
log consolidation tools. Therefore,
Who Is subject to the PCI DSS? organizations risk losing event data when
PCI DSS has broad applicability. In order logs roll over. Since no one can tell
to determine whether a company is beforehand what log data will be needed
subject to the PCI DSS compliance, when bad things happen, it’s critical to
answer the following questions: ensure that all audit data is captured and
◦◦ Is the business any of the following? saved in a reliable manner.
◦◦ Card acquirer ◦◦ Cryptic descriptions of events—Most
◦◦ Merchant native audit logs were added as an
◦◦ Processing agency afterthought once the main functions of
◦◦ Does the organization store, exchange, or the system or application they belong to
transmit payment card data on any of the were developed. That’s why a disconnect
following systems and devices? exists between what the system or
◦◦ Database or application servers application puts in its logs and what
◦◦ Workstations administrators would like to see in the
◦◦ Firewalls logs to understand what specific users
◦◦ Routers actually did in the system or application.

5
Without appropriate tools, administrators
system security. This process must meet
are hard-pressed to distinguish the most
the following requirements:
important events from a myriad of others.
◦◦ Staff in charge of system security must be
Moreover, they must then try to obtain all
notified of all changes to critical system
the information they need from the cryptic
files. Every time a critical system module
descriptions recorded in the logs.
or data file is changed, the appropriate
personnel should get a notification that
To enable administrators to use native
kicks off a change review process.
logs effectively, a solution must address
◦◦ As part of the change review process,
both of these issues as well as cover
administrators must have tools to
the gaps in what the native logs record.
distinguish legitimate changes from
accidental and unwanted ones that can
Preserve audit data in long-term storage
The PCI DSS The PCI DSS regulations require
◦◦
impair normal business operations.
If a file change under investigation is
organizations to collect audit data
regulations require located anywhere on the network and
deemed inappropriate and in violation
of the established security policy, the
organizations to store it for an average of at least two
years. Organizations often underestimate
organization must be able to roll the
change back before it adversely affects the
collect audit data their log storage needs and run into
business.
significant issues when they run out of
located anywhere the storage they allocated upfront.
Establish & enforce separation of duties
on the network Track user access to protected data
Organizations must implement the
principle of separation of duties to
and store it for an The PCI DSS requires organizations to
prove “who did what” for each user
separate auditors from administrators

average of at least action involving any protected data. The


whose actions are being audited. In
particular:
organization must capture the entire
two years. context of each user action, including all
◦◦ Organizations have to make sure that audit
trails are tamper-proof and protected
of the following:
from unauthorized modification. Attempts
◦◦ The “before” and “after” values for each
to clear up the log may be a sign of
change event—Simply recording that a
covering tracks after a successful attack
given user made a change to a particular
to the compromised system. That’s why
IT resource is not enough; each change
it’s important to ensure integrity and
event contains the “before” and “after” state
authenticity of the logs in the first place.
of that resource. For example, each time a
◦◦ A thorough delegation model must be
critical Active Directory object is changed,
available to grant different levels of log
the corresponding event must contain the
data access to different people within the
value of the object attribute before and after
organization. For example, the help-desk
it was altered.
personnel might need access to only the
◦◦ The origin of the event—Sometimes,
parts of the audit trail showing account
when several people share the same
lockout events while internal auditors will
administrative account to do their jobs, it’s
most likely need access to all log data to
impossible to trace an action back to a
conduct periodic log reviews.
particular individual without knowing which
computer the action was performed from.
Review audit data regularly
In those cases, it’s essential to track the
The PCI DSS standards require
origin of the event down to the particular
organizations to carefully review the
workstation the user was logged into when
activity of both regular and administrative
taking the action.
users and evaluate that activity against
established security policies. Different
Monitor file integrity
types of activity require review at
The organization must monitor the
different frequencies:
integrity of all critical files and folders
◦◦ Administrative activity—Daily
whose modification can compromise
◦◦ Access to critical system files and

6
folders—Daily
companies put auditing and security
◦◦ Failed access attempts—Weekly
policies in place to maintain control over
◦◦ Successful resource access—Monthly
their infrastructures. Some companies
capture daily events, such as successful
According to the Verizon 2012 Data
logons and logoffs, so they can
Breach Investigation Report, 96 percent
understand who is on their networks at
of victims subject to PCI DSS had not
any given time. Another example of an
achieved compliance because they
internal security policy is the requirement
had either not conducted regular
to track the activity of privileged users
assessments or had never assessed and
who have been granted the rights to set
validated their controls.
up new user accounts or remove users
from the enterprise. The rights granted to
Compliance benefits
Compliance with any of the four
these users can easily be abused, leaving
the organization exposed to an internal
Organizations
compliance regulations discussed above
has broad benefits:
security threat. have to make sure
◦◦ Avoiding fines and loss of business—The that audit trails
Summary
costs of noncompliance often exceed
the costs associated with maintaining
Maintaining compliance with external
regulations or internal policies means,
are tamper-proof
compliance over time. If organizations fail
to comply, not only will they face stiff fines
at a minimum, keeping track of all and protected
electronic documents (data files, email,
and penalties, but partners and customers
images) that are covered by those from unauthorized
may take their business elsewhere, where
they can be assured that their interests are
regulations and tracking access to those
files. Upon request, organizations need
modification.
protected.
◦◦ Increased security and operational
to prove, through reporting, that they Attempts to clear
have established appropriate control
efficiency—Compliance initiatives often
over access to resources. With the right up the log may be
increase security and operational efficiency
across the organization. When IT staff
auditing solution, organizations can
capture, collect, store, and report on
a sign of covering
starts implementing security best practices
described in compliance regulations,
events related to security-sensitive user tracks after a
activity (such as account creation, group
they often expose security holes and
membership changes, and permission successful attack to
inefficiencies in internal processes that the
organization was unaware of.
changes) and also notify the responsible
personnel of events that might indicate
the compromised
◦◦ Visibility into day-to-day IT operations
—Looking into what resources IT staff
an intrusion. system.
can access and what actions they are Best practices for managing
permitted to perform is often eye-opening. compliance
Organizations often find that employees
Now let’s turn our attention to best
have access to sensitive data they shouldn’t
practices for implementing a compliance
see or that multiple administrators use the
solution. These best practices can be
same account and password. Knowledge
grouped into three key steps:
is power, and this knowledge will empower
1. Planning—Determine how the regulation
organizations to improve the security of
affects the organization. What functionality
their data and IT systems.
is needed from a solution, and which parts
of the infrastructure are involved?
Internal security policies
2. Selecting—Review vendors and solutions
We have discussed several external
that best meet the requirements.
regulations that are driving corporations
3. Deploying—Consider issues that may occur
to perform audits and prove compliance.
when rolling out the compliance solution.
Organizations may also put into place
internal controls, typically through their
Planning
IT, human resources, legal, security,
To successfully implement an IT
or compliance departments. Many
compliance solution, organizations

7
certain actions that might be detrimental—
must plan carefully and pay special
such as domain renames—even when
attention to both technical and business
attempted by properly provisioned users
needs. They must also be keenly aware
who would normally have the right to take
of how external regulations and internal
the action.
policies affect the organization and IT
◦◦ Provisioning automates the process of
in general. Here are the recommended
assigning rights to users and groups based
steps for planning the deployment of a
on variables set in their profiles.
compliance solution:

It is also useful to rank requirements by


Step 1: Define the critical reasons for
importance. For example, is the ability to
implementing a compliance solution
select a compatible font as important as
When defining the reasons to implement
the ability to schedule a report?
 ith the right
W a compliance solution, pay special
attention to the business and best
Step 3: Choose which components
auditing solution, practice reasons discussed in the
of the environment are critical
Regulations and Corporate Governance
organizations can section of this paper. Understanding
for compliance
Based on the reasons for implementing a
capture, collect, auditing requirements and how they
affect an organization early in the process
compliance solution, organizations can
single out the resources necessary for the
store, and report on will help them conduct a stress-free audit
corresponding processes. For example,
when the time comes. Also consider the
events related to recipient of the auditing information; is
if a government regulation requires
organizations to track user access to
security-sensitive it someone like the CISO or will it be an
auditor?
protected data, then those organizations
need to monitor only computers that
user activity... contain protected data as well as track
Step 2: Determine what functionality
and also notify is required from a solution Based on a list
who has access to them at any point
in time and how their rights change. In
the responsible of reasons defined in the previous step,
identify what type of information needs
other instances, organizations may need
to collect information from all servers or
personnel of events to be collected and reported on. For
even from individual users’ workstations.
example, HIPAA requires organizations to
that might indicate archive logon attempts. For this type of
Performing a technical assessment will
an intrusion. task, many organizations need to collect
and store events from their servers’
help the organization determine which
parts of the environment need to be
security logs.
monitored. This knowledge will help in
estimating the required scalability of the
Once this information has been identified,
solution. For example, a regulation might
choose the functionality required from a
require the collection of the following
solution:
information about computers on the
◦◦ Caching enables organizations to provide
network:
reasonable assurance that no logs have
◦◦ Computer roles, such as domain controller,
been lost or tampered with.
member server, and workstation
◦◦ Archiving enables organizations to prove
◦◦ Platforms and operating system versions
compliance with legislative regulations and
installed
prepare for forensic investigations.
◦◦ Resources, such as file shares, directory
◦◦ Analysis and reporting allows organizations
objects, and printers, for which access will
to track user activity.
be reviewed
◦◦ Baselining enables organizations to
measure a specific system and compare it
Step 4: Estimate the volume
against all other servers in the organization
of information
for standardization and compliance.
Ascertaining the space required to store
◦◦ Real-time monitoring provides alerts on
events and various configuration data is
events critical to business continuity. In
very important since the reporting and
addition, many products can prevent

8
archiving functions of the compliance Configuration management
solution usually store a large amount The solution must be able to take
of data. Estimation can be a time- a complete snapshot of a system
consuming and laborious task, which is and compare it against a known or
best handled by automation. recommended state of another system.

Determining the number of resources, It’s also important to consider events


the type of information to be retained, that track configuration changes to the
and the retention period helps establish compliance solution itself to know if
the performance requirements of the users are changing the auditing system.
compliance solution.
Scalability
Evaluation criteria for
selecting a solution
Scalability is the product’s ability
to maintain its efficiency when the
The most important
Once the requirements have been environment grows in size or volume. criteria for
defined, it is time to choose the solution Consider several features when
to implement. We recommend that determining the solution’s scalability: evaluation
◦◦
organizations perform a technical
evaluation, preferably in a lab
Traffic compression—The ability to
compress traffic across the network and on
relate to the main
environment that closely mimics the file storage systems functions a solution
production environment. The evaluation ◦◦ Filters on data sources—The ability to
process includes determining specific specify what data to collect at a granular should perform—
technical criteria and prioritizing them. level
The most important criteria for evaluation ◦◦ Compare—The ability to compare the that is, assess,
relate to the main functions a solution
should perform—that is, assess, audit/
collected data against a defined list of audit/alert, and
requirements
alert, and remediate. The importance of ◦◦ Distributed collection—The ability to load- remediate.
each criterion depends on the type of balance the data collection process among
solution required. several collector servers, which may be
spread out geographically
Our recommendation is to evaluate ◦◦ Incremental updates—The ability to update
each solution against the criteria a configuration data store with only the
presented below and choose the one changes that occurred since the last data
with the highest scores in the areas most collection
important to the particular organization.
Regardless of the type of solution Security
required, it is important to evaluate Consider whether the solution provides
each function (assess, audit/alert, and the following security features:
remediate). We recommend that ◦◦ Traffic encryption—Encryption of traffic
organizations consider the following for between agents and servers
each function: ◦◦ Agent/server authentication—

Automation Analysis & reporting Storage

Collection of data as it relates to configuration Detailed reporting should be provided in Information should be stored in a secure,
information for the server environment should categories, such as permissions, policy settings, streamlined storage area to enable the organi-
Assess be automated. and hard-ware/software information. zation to track changes over time.

The capture, aggregation, and storing of events Detailed reporting and alerting is required to Because audit logs can grow quickly, compres-
involving user access to sensitive information provide both periodic review of user activity sion is a key to long-term storage.
resources should be automated. and security.
Audit/alert
Alerting should be available through a choice of
technologies, such as email or SNMP, and easily
integrated into existing processes and tools.

Provisioning should be automated to Detailed reporting should be available to Information should be stored in a secure,
ensure that all users are assigned the correct ensure that all users are assigned permissions streamlined storage area to enable the organi-
permissions based upon their roles in the in accordance with established security policy zation to track changes over time.
Remediate
organization. and business needs.

9
Authentication between agents and servers
Two data storage types—A complete
◦◦ Optional agent-less collection—The ability
product must have two data storage
to optionally collect data without agents is
types: a file repository structure for
required in environments where the use of
archiving and database support for
agents is prohibited on important servers for
analysis and reporting.
security reasons
◦◦ Backup technology—The ability to easily
◦◦ Caching of local data—The ability to cache
back up collected event data is mandatory
audit logs as they are being created in a
since some regulations require long-term
separate, secure location to prevent anyone
storage of event data.
from tampering with and losing audit
◦◦ Granular restore—The ability to restore
log data
selected granular portions of event
◦◦ Guaranteed message delivery—The ability
data is a must.
to withstand network or server outages
◦◦
Delivery of alerts to and maintain a list of events that occurred
Consolidation technology—For widely
distributed networks or networks with
during the outage. Local agent-based
responsible persons alerting for critical events can also be useful.
slow links, the product must be able to
automatically consolidate event data from
should be fast and Performance
multiple data stores on a scheduled basis.
◦◦ Retention management—The ability to
reliable and include Two important criteria for evaluating
delete unnecessary granular portions of
performance are the number of events
a number of the agent collects per second and the
event data from the data storage is required.

maximum number of agents a single


notification instance can support. Also, the solution
Data collection management
Data collection management refers
methods. In must scale horizontally through the
addition of management servers and
to the resources required to deploy

addition to the distributing agents.


and manage the entire data collection
process. Below are criteria by which to
notifications, a Alerting / correlation
evaluate this effort:
◦◦ Configuration flexibility—It should be easy
series of linked Delivery of alerts to responsible persons
should be fast and reliable and include
to specify computers, define event filters,

response actions a number of notification methods. In


and schedule settings.

addition to the notifications, a series


should be of linked response actions should be
Agent deployment—In order to
accelerate the deployment process, a
available. available.
• Notification methods—The product should
product should be able to install agents
remotely. Note that a manual installation
be able to send alerts via Web, email,
process may also be necessary when
and smartphone, as well as SNMP for
remote access to the target computer
organizations that have deployed broad
is blocked (e.g., by a firewall). Also
monitoring solutions, such as HP OpenView.
consider other ways of automating the
• Response actions—The product should
deployment process, such as using
provide the flexibility to link other processes
Group Policy.
to the event when certain criteria are met.
For example, if a policy change occurs, the
Agent management and troubleshooting
application should be able to launch another
The product should provide for
application in response.
centralized, low-cost agent management
• Correlation—The product should allow
through important features, such as
organizations to gather events from
remote activation and deactivation of
different systems and group them into an
agents; automatic delivery of upgrades to
alert or report to inform the administrator of
agents; deployment of custom utilities on
suspicious activity.
monitored computers for use by agents;
and monitoring of agent functioning.
Storage
Automated provisioning
Consider whether the solution offers the
The solution should enable the
following features:
organization to set rules for provisioning

10
and de-provisioning all user accounts Once organizations are armed with a
and associated permissions based on comprehensive technical view of the
certain variables in the account. environment, they need to determine
the number of management servers
Change control and their locations on the network to
The solution should enable the effectively distribute the load. Take
administrator to require a chain of into consideration the following issues
approvals by email before an actual that may affect the performance of the
change takes place in the infrastructure. solution.

Adjust auditing Collector servers


The solution needs to be able to For servers dedicated to collecting
separate the “wheat from the chaff.” The
organization must be able to exclude
the data:
◦◦ Performance rate—The performance
The solution needs
events from alerting and reporting that rate is defined as the number of events to be able to
are considered “white noise” or normal processed per second, the number of
operations. changes per day within Active Directory, or separate the “wheat
the number of objects being managed. This
Reporting measurement will help with the estimation from the chaff.” The
The solution should include the following
reporting capabilities:
of how many monitored computers one
collector server can handle. However, for
organization must
• Predefined expert knowledge—The solution best results, always test the solution in a be able to exclude
should either contain reports to meet lab environment as similar to production as
auditing requirements or should permit possible. events from alerting
editing of the reports that come with the ◦◦ Traffic load—Ensure that the link between
product to meet the requirements. the collector server and the monitored and reporting that
• Data analysis and representation features—
The product should offer well-formatted
computers is sufficient. Otherwise, network
bottlenecks may impede data collection or
are considered
reports, advanced filtering, drilldown changes being pushed to the environment. “white noise” or
features, charts, and forensic analysis In regard to audit log management, we
capabilities. Some reports will need to be recommend agent-based solutions with normal operations.
text-based while auditors may want more compression and alerting as well as the
visually appealing reports. ability to schedule collection during non-
• Report distribution system—The solution business hours.
should enable organizations to export
reports to commonly-used formats and This information will enable organizations
distribute them as needed, for example, to deploy one collector server per N
through email or by publication to a Web computers and run the collections every
portal. Automation of the report creation X hours (or minutes), where N and X
and distribution is also important. depend on the organization’s unique
• Single view—The solution should take all characteristics and needs, including the
information from different sources and following:
provide a single view into the organization’s • Growth rate of the logs
compliance initiatives. • Collection performance rates
• Periodicity of reporting
Deploying a solution • Impact on traffic
Once the appropriate solution has been
selected, the final step is deployment. Storage servers
Two key issues that should be considered For servers dedicated to storing event
before starting the deployment process data, be sure to distinguish between
are: storage servers designed for archiving
◦◦ Performance purposes and those for analysis and
◦◦ Audit and event log retention settings reporting purposes. Archiving storage
servers should minimize space

11
consumption whereas reporting and Audit and event log retention settings
analysis storage servers should be Another important step in the
optimized for fast analysis of data. deployment is to verify that the audit
◦◦ For archiving, consider using a long-term settings for the selected part of the
storage system rather than a database environment are appropriate. In other
system. A database system requires words, confirm that the systems will
several times more space and therefore register only events needed to satisfy
has a higher total cost of ownership than the requirements outlined earlier and no
specialized file-based repositories or native more so as to limit the amount of storage
file formats (.EVT, for example) due to the solution requires.
the cost associated with purchasing and
maintaining more disks and the cost of If audit logs of a particular system,

Confirm that underlying database management software. application, or device do not provide
a satisfactory level of detail for critical
the systems will For analysis and reporting, a database types of user access or system changes,
is preferred since the ability to analyze, consider solutions that offer proprietary
register only events correlate, and report is paramount. methods to capture needed audit

needed to satisfy However, keep the database reasonably


small for fast report compilation by:
information, not dependent on the native
logs.
the requirements ◦◦ Storing data for a defined short period of
time (two to four weeks) Conclusion
outlined earlier and ◦◦ Maintaining separate reporting databases Whether to comply with federal

no more so as to for different parts of the environment. regulations like HIPAA, SOX, or GLBA,
or to meet internal security policies,
limit the amount of Forensic analysis of security incidents and managing the infrastructure effectively
suspicious user activities usually involves can eliminate stress.
storage the solution digesting large amounts of historical data

requires. that cannot fit in a relational database. In


such cases, consider alternative audit log
Maintaining IT governance and
compliance has become a standard
data storage and querying technologies. operating procedure for many
File-based data repositories featuring organizations. The key to successfully
sophisticated data compression and deploying a solution lies in:
indexing techniques, as well as powerful ◦◦ Defining requirements—Determine the
interactive querying capabilities are business need and how that translates into
becoming a de-facto standard for dealing necessary IT controls and requirements.
with vast amounts of audit log data. Assess risks, assign values to them, and
then identify gaps in the current security
Storage consolidation environment.
To minimize traffic and performance ◦◦ Selecting a solution—Be sure the selected
issues, consolidate storage. Using this solution has sufficient functionality to
technique, which is illustrated below, assess, alert, and remediate in line with the
each collector server has its own local organization’s specific compliance and
storage, where frequently collected logs business requirements.
reside. Collections may occur every one ◦◦ Deploying the solution efficiently—Take
to two hours to prevent the logs from into account performance factors for the
being overwritten. Then, periodically solution and the environment.
(every night or even less often), these
local storages are consolidated into a
single global archive, satisfying the need
to archive data or to perform ongoing
analysis and reporting

12
Whether to comply
with federal
regulations like
HIPAA, SOX, or
GLBA, or to meet
internal security
policies, managing
the infrastructure
effectively can
eliminate stress.
Figure 1. Storage consolidation allows widely distributed networks to regularly collect
data locally and consolidate it into a central database.

13
For More Information
© 2012 Dell, Inc. ALL RIGHTS RESERVED. This document DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS
contains proprietary information protected by copyright. No ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING
part of this document may be reproduced or transmitted in TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE
any form or by any means, electronic or mechanical, including IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR
photocopying and recording for any purpose without the A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO
written permission of Dell, Inc. (“Dell”). EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL
Dell, Dell Software, the Dell Software logo and products—as DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES
identified in this document—are registered trademarks of Dell, FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS
Inc. in the U.S.A. and/or other countries. All other trademarks OF INFORMATION) ARISING OUT OF THE USE OR INABILITY
and registered trademarks are property of their respective TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED
owners. OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no
representations or warranties with respect to the accuracy or
The information in this document is provided in connection completeness of the contents of this document and reserves
with Dell products. No license, express or implied, by estoppel the right to make changes to specifications and product
or otherwise, to any intellectual property right is granted by descriptions at any time without notice. Dell does not make
this document or in connection with the sale of Dell products. any commitment to update the information contained in this
EXCEPT AS SET FORTH IN DELL’S TERMS AND CONDITIONS AS document.
SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT,

About Dell
Dell Inc. (NASDAQ: DELL) listens to customers and delivers
worldwide innovative technology, business solutions and
services they trust and value. For more information,
visit www.dell.com.

If you have any questions regarding your potential use of


this material, contact:

Dell Software
5 Polaris Way
Aliso Viejo, CA 92656
www.dell.com
Refer to our Web site for regional and international
office information.

WP-BPG4itGovcompi-US-TG-2012-12-13

You might also like