T 2.161 Loss of confidentiality and integrity regarding logged data

Some IT systems generate logged information such as user name, IP address, email address, and computer name that can be allocated to specific persons. Such information can be intercepted and manipulated if transmission is insecure and not encrypted. This risk is particularly applicable if centralised logging is used. Such information improves the attack opportunities. For example, if an attacker knows the user names, he/she can attempt to guess the corresponding passwords or try to crack the password using dictionary attacks (see also T 5.18 Systematic trying-out of passwords).

The integrity of the logged information may also be affected adversely by insecure and unencrypted transmission, as well as by misbehaviour of administrators. For example, if an administrator changes or deletes the logged data in order to conceal a configuration error, the information may no longer be processed further. Furthermore, transmission errors during transmission to a centralised logging server may cause a loss of integrity for logged data. However, data may also be forged deliberately in order to provide incorrect information.

Examples: