As crunch bites: Don't neglect the logs

Quocirca's Straight Talking: Flushing out vulnerabilities

Quocirca's Straight Talking: Flushing out vulnerabilities

Managing log files may seem like a mundane issue but doing it well tightens data security and boosts compliance efforts, says Quocirca's Fran Howarth.

Managing risk, compliance and security are objectives that still need to be achieved even while organisations rush to cut costs.

The insider threat in particular has always been a key challenge for organisations and, with staff being made redundant in droves these days, access rights to sensitive company information must be revoked quickly.

The external threat is getting worse as well, as hackers are increasingly targeting corporate networks for financial gain. In January 2009 security technology vendor McAfee estimated that data theft and breaches cost businesses worldwide approximately $1tr in lost intellectual property and expenditures for cleaning up the damage caused.

All organisations should take note. In an economic downturn, businesses switch focus from acquiring customers to retaining them. Any security breach where data is lost could damage their reputation and cause customers to jump ship.

Security from A to Z

Click on the links below to find out more...

A is for Antivirus
B is for Botnets
C is for CMA
D is for DDoS
E is for Extradition
F is for Federated identity
G is for Google
H is for Hackers
I is for IM
J is for Jaschan (Sven)
K is for Kids
L is for Love Bug
M is for Microsoft
N is for Neologisms
O is for Orange
P is for Passwords
Q is for Questions
R is for Rootkits
S is for Spyware
T is for Two-factor authentication
U is for USB sticks/devices
V is for Virus variants
W is for Wi-fi
X is for OS X
Y is for You
Z is for Zero-day

Failure to adequately protect information and ensure its integrity has not been compromised could also lead to organisations being unable to comply with a growing roster of regulations requiring higher data security standards including: the Payment Card Industry Data Security Standard (PCI DSS); e-discovery requests, which are commonplace in the US and becoming more so in Europe; and security breach disclosure legislation, which is expected to be enacted in the near future by the EU.

Because of these factors, protecting data is now one of the top business-driven issues for improving security and managing risk.

In order to prove that security controls are effective and to be able to comply with potential litigation requests, organisations need to put in place an effective system for policing information governance, including the ability to organise, retrieve and analyse information, as well as to report on the effectiveness of controls over information access for audit purposes and for responding to litigation requests such as e-discovery.

This means establishing a system of electronics records management across the organisation, covering all data stores and including both structured data, such as databases, and unstructured information, such as emails and documents. The system must cover the entire lifecycle of electronics records - including when they are generated, backed up and archived - and must ensure the integrity of all records is maintained.

That in itself is a daunting enough challenge. But then there are the computer-generated log files. Log files provide granular information about activities by the hardware and software on your network, such as which machine tried to gain access to a particular server, at what time and on which date. Analysis of these log files allows an administrator to compare activities against expected norms and policies.

Log files may contain critical information that can throw to light anomalies, whether they are misconfigurations, inappropriate actions by individuals or evidence of other system vulnerabilities. They are the basis for proving the chain of information custody for governance purposes, in answering litigation requests, and in performing forensics to find out why something happened.

Collecting, storing and recovering log data is a hard task. They are largely undecipherable to humans, containing line after line of repetitive computer-generated code. According to the 2008 version of its annual log management survey, the Sans Institute found just 35 per cent of respondents were satisfied with their log analysis capabilities. The most problematic issues cited by respondents were collecting log records, searching for and reporting on log data.

Among the problems are that logs are generated in a variety of inconsistent formats and must be enriched before they can usefully be indexed and searched.

Although log files provide important information about the security posture of electronic networks, log file management and analysis is a problem largely overlooked in many organisations.

Some do it manually - a tall order - while others use homegrown systems. Automated log management and analysis is a better way for organisations to discover and respond to security vulnerabilities that could compromise sensitive data.

By including log files in information governance plans, organisations can take control of data in all forms to minimise risk across the organisation. Some regulations place a lot of emphasis on logs. For example, the PCI DSS regulation requires that adequate controls are in place for log management, including collection, review, retention and destruction of those logs.

With compliance, cost control and security key objectives this year, organisations should look closely at the effectiveness of their log management. It may seem like a mundane issue but log files can help flush out vulnerabilities, shield organisations from risk and help them meet broader compliance objectives.

A leading user-facing analyst house known for its focus on the big picture, Quocirca is made up of a team of experts in technology and its business implications. The team includes Clive Longbottom, Bob Tarzey, Rob Bamforth, Louella Fernandes, Fran Howarth and Simon Perry. Their series of columns for seeks to demystify the latest jargon and business thinking. For a full summary of the consultancy's activities, see