T 5.176 Compromising the logged data transmission during centralised logging

If the logged data is stored centrally, the recorded information is transmitted to the logging server where it is processed and analysed. The transmitted logging events may contain personal information such as user names that can be assigned to a specific person. If the logged data is transmitted using insecure and unencrypted transmission routes, it may be tapped or manipulated.

Exploitation of in-band connections

If IT systems are operated in an insecure network, the systems are most likely exposed to attacks from the network. A packet filter in a security gateway positioned between the public network and the Application Level Gateway is an example. If logged information of the packet filter is to be sent to a centralised logging server, a data connection to the centralised logging server using the Application Level Gateway and possibly using further systems is required (in-band). This connection option could also be used by an attacker, because externally initiated connections into the internal networks constitute a vulnerability. Within the framework of an out-of-band connection, these problems do not occur, because the logged data is transported within a proprietary, closed network. However, this is significantly more complex. A separate network infrastructure must be established and another network must be administered. Furthermore, the possible damage may be severe if an attacker managed to compromise the out-of-band network.

Compromising the centralised logging server

If a centralised logging server not positioned in a separate administration network is compromised, it facilitates attacks to further components due to its central location. Since the server must be available both to IT systems upstream and downstream of the security gateway, it provides the attacker with the opportunity to bypass the security gateway of an information system. This way, the data traffic between the email server and the logging server could be recorded with the help of a network analysis tool and possible personal data may be read, for example. Moreover, an attacker can read and manipulate logged data.

Manipulated logged data

If an attacker manipulates logged data, its integrity and completeness are challenged and its validity and reliability are no longer guaranteed. Manipulated log messages may cause dramatic problems even regarding an IT early-warning system if only an incomplete picture of the situation can be generated causing attacks to IT systems or applications to remain unnoticed, for example. One reason for incomplete logged data may be the use of network protocols such as the User Datagram Protocol (UDP) which do not provide any mechanisms for checking whether all packets were transmitted completely.

Bandwidth bottlenecks

Due to the large amount of logged data transmitted through the network in addition to the user data, bandwidth bottlenecks may result in the transmission of the log messages impairing the transmission of the user data. Furthermore, bandwidth bottlenecks may cause log information to be forwarded in a delayed manner or to be lost entirely. In an IT early-warning system, this may cause dramatic problems, because an overall picture of the information system can only be generated through the sum of the individual partial information of the different IT systems.

Example: