You are on page 1of 4

CONFIDENCE: SECURED WHITE PAPER

MEETING THE TRUE INTENT OF


FILE INTEGRITY MONITORING
A CRITICAL CONTROL FOR PROTECTING YOUR DATA

ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE


INTRODUCTION
The term “file integrity monitoring,” or FIM, first cropped up back in 2001 MAKING FIM AN
when the VISA started working on a security specification that would EFFECTIVE SECURITY TOOL
To return FIM to its rightful place at
eventually become the Payment Card Industry Data Security Standard the security table, we must change how
(PCI DSS, or just PCI). FIM was referenced in two requirements of PCI we use FIM and ensure our FIM solu-
specification, but requirement 10.5.5 specifically instructed organizations tion has specific capabilities. We must
decide what in the infrastructure needs
that processed, transmitted or stored cardholder data to “Use file integrity
to be monitored and how to manage the
monitoring/change detection software (such as Tripwire) on logs to ensure changes to those IT assets that our FIM
that existing log data cannot be changed without generating alerts.” solution detects. We also need a solution
that gives us more information than a
In reality, FIM had been around AN OVERVIEW OF FIM basic “something changed.” Finally, we
before its reference in the evolving PCI FIM is technology that monitors files need to analyze each change to identify
standard. Previously, though, it used a of all types and detects changes in these when changes introduce risk.
different name: “change audit.” So here files that can lead to increased risk of
we are ten years later. Where is FIM data compromise. Unfortunately, many DETERMINING WHAT
now? Is it still relevant or important? merchants subject to FIM under PCI TO MONITOR AND MANAGING
Does it really protect data and improve have lost sight of its intent and spirit. DETECTED CHANGES
security? The answers, in order are: For these merchants, FIM means noise: Monitoring every file on every device
too many changes, no context around or application all the time is impracti-
1. FIM is still called file integrity these changes, and very little insight into cal and unnecessary, so the first step
monitoring (FIM), and is now part of whether or not a given detected change for effective FIM is controlling what
almost every IT compliance regulation poses a risk or is just business-as-usual. is monitored. Ideally, a FIM solution
and standard and every IT secu- It’s hard to argue with them given that would provide a way to control what
rity standard. Some refer to FIM as this has been their experience with the files are monitored for change and the
“change audit.” FIM tools they’ve used. level of monitoring these files require. In
2. Yes, FIM is still relevant and impor- other words, the solution would let you
tant, although many organizations FIM actually is a critical tool in the fight determine how much information about
that must use FIM solutions complain against cardholder data compromise, these files—the file properties—you
that the term “FIM” is now synony- and really, of any type of sensitive data; want to capture. You would make those
mous with “noise” due to the huge however, a true FIM tool must provide determinations based on the type of file
volume of changes these solutions additional information. That informa- being monitored and how much risk
detect. tion, or intelligence, would allow it to changes to a file might introduce. For
3. Yes, FIM does protect data and only alert security teams to changes that example, a permissions file for a finan-
improve security, but only when FIM pose increased threat to cardholder data, cial application represents a high-risk
has specific capabilities. and not to the hundreds of thousands or file. You would likely want to harvest
even millions of changes that occur daily enough properties about changes to this
In this paper, we give an overview on large, enterprise-level IT infrastruc- file to help you determine if a change is
of FIM, an explanation of how FIM ture. It’s also important to understand “expected” or if it is “suspect.”
provides data protection and improves that while FIM is valuable to PCI, it can
security, and what capabilities FIM must and is used to reduce risk of compromise Although you will limit the scope of the
offer to effectively provide that data pro- to any IT asset, not just cardholder data. files you monitor, as well as the properties
tection and security. you capture for each monitored file, even
a medium-sized organization will generate
a large amount of change data. Managing
the large volume of change data captured

2 Meeting the True Intent of FIM


by a FIM solution requires a version- device to get this “who” information; yet
based architecture that is compact and most IT professionals will not allow this THE CAPABILITIES OF
fast, and that stores data permanently. due to concerns about security. The use
TRUE FIM
One approach that has proven highly of real-time detection agents installed »» Detects changes
successful is to capture the initial state, on each monitored device can overcome »» Determines which changes
or baseline, of every monitored file or this issue. introduce risk
element and store it in a database. From
that point on, the solution detects any DETERMINING IF EXPECTED, »» Determines which changes
changes to an element, including the ACCEPTABLE CHANGES WERE MADE result in non-compliance
properties you determined need to be Many changes are intended to make »» Distinguishes between high-
monitored, and stores that change data in improvements or to correct problems. and low-risk changes
the database as the original baseline ver- However, just because a change is pro-
sion plus these typically minor changes. posed and scheduled does not mean that »» Integrates with other
These “delta” versions, where delta means it was actually made or made correctly. security point solutions
incremental change to the element’s Being able to confirm that a change
properties, must be stored indefinitely in has successfully been made is critical;
the database. But to truly add value, the otherwise improvements that you think
solution must allow this captured history were made are not always realized and ADDRESSING THE ISSUE OF
of each element to be accessed, analyzed problems remain when you think they UNAUTHORIZED VS. UNDESIRED/
and acted upon at any point in time. have been resolved. A true FIM solution SUSPECT CHANGE
needs to detect a change, and must also PCI DSS 11.5 requires merchants to “…
DETERMINING WHAT CHANGED be able to compare that change against alert on unauthorized modification of
AND WHO MADE THE CHANGE what was expected to change. Such capa- critical system, content or configuration
Knowing only that a file has changed bility provides independent confirmation files…,” but the term “unauthorized”
is of little use unless you know what of change processes and policies. is fairly misleading. Many interpret the
about the file or what within the file term to mean that they must measure
has changed. Each file has dozens of While most changes are intentional, how well the organization adheres to
attributes that, if changed, could spell or at least not harmful, some changes change process policy. In fact, the intent
trouble. Capturing these attributes simply shouldn’t be made because they of the term in the requirement is for
can provide information essential in pose increased risk to the environment. organizations to be alerted to changes
determining if the change is harmful Critical configuration files are one that are undesirable and could put card-
or harmless—it tells you exactly what example. Each of these files contains one holder data at risk of compromise. The
within a file changed so you can quickly or more configuration settings values 11.5.b Testing Procedure that was added
determine if the change was high-risk that must be in predefined states or in version 2.0 of the security standard
and provides the information required to ranges to meet and maintain security clarifies that it is an audit requirement to
fix the issue. A true FIM solution will be policy. If any of these configuration “Verify the tools are configured to alert
able to harvest this level of information, files are changed, the settings values personnel to unauthorized modification
including changes to configuration files must immediately be re-evaluated to of critical files…”.
and even character-for-character differ- determine if they still conform to the
ences to human-readable file types like security policy. Application executable Auditors have typically required proof
Word documents or PDF files. (.exe) files of mission critical applications that appropriate change data has been
are another example of file types that captured, but there has been inconsisten-
In addition, knowing who made a should probably generate an alert if they cy in verifying whether the FIM solution
change is often key to determining if change for any reason. A true FIM solu- was also configured to determine if any
a change is suspect or low-risk. But tion must know what has changed, what of detected changes were not authorized.
capturing the “who data” is not easy, specific files are supposed to change, and Too often, the change data has just been
and most FIM solutions are unable to if a given change is within policy. This stored “in bulk” in an effort to meet
provide this important information. ability to analyze changes converts vol- compliance requirements. However, if
Most FIM solutions available today need umes of change data from “noise” into the data is not continually analyzed for
to enable OS Auditing on the monitored actionable intelligence. “high-risk” change, the FIM solution

Meeting the True Intent of FIM 3


provides limited—or no—protection
against cardholder data compromise. CONCLUSION:
Even in cases where the FIM solution
is being used to help determine which TRUE FIM MAKES
changes don’t follow approved change
process, unauthorized change differs
a great deal from suspect or undesired
FIM RELEVANT
change. Unfortunately, many presume So again, we ask, “Is FIM still relevant and important?” The answer is a
that unauthorized change is always resounding yes. FIM is a critical capability IT security and compliance need
“bad,” which is not necessarily true.
to protect the IT infrastructure and its sensitive data. But for FIM to be
While an unauthorized change may not
have followed defined change process relevant, it must do a lot more than just detect changes. “True FIM” must
policy, it may actually resolve a critical use change detection to help determine whether the changes are good
problem. On the other hand, defining or bad. It must also provide multiple ways to distinguish low-risk change
a change as authorized presumes it is a
“good” change, which may be equally from high-risk change. And it must do this at the speed of change.
untrue. Many authorized changes cause
problems and have to be rolled back or In addition, true FIM should also work with other security point solutions,
modified—sometimes using an unau- like those for log and security event management. Correlating change data
thorized process.
with log and event data allows security professionals to better protect their
Whether a detected change can be rec- environment, including cardholder data environments. Doing so, allows
onciled to some form of authorization or security professionals to quickly see, trace and relate problem-causing
not fails to address the issue of a “bad” activities with each other. Such visibility and intelligence provides the key
change; that is, a change that exposes a
device or application to increased risk of for quickly remediating issues before they cause real damage.
compromise. Finding bad change is the
issue that must be addressed by FIM—
and that is the true intent of the PCI
DSS 11.5 requirement. And not only
should FIM detect bad change, it should
detect it immediately so the damage
can be minimized. A true FIM solution
helps merchants automatically deter-
mine if detected change is authorized
(or even most likely authorized). More
importantly, a true FIM helps automati-
cally determine if a change is suspect
and needs immediate investigation, or is
expected and can be considered low- or
no-risk.

u Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service provid-
ers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based
on high-fidelity asset visibility and deep endpoint intelligence combined with business-context, and enable security auto-
mation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and
policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at tripwire.com. u

SECURITY NEWS, TRENDS AND INSIGHTS AT TRIPWIRE.COM/BLOG u FOLLOW US @TRIPWIREINC ON TWITTER

©2014 Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc.


All other product and company names are property of their respective owners. All rights reserved. WPTFIM2a 201007

You might also like