S 2.500 Logging IT systems

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

Security-relevant activities on information processing systems should be logged for many reasons. On the one hand, when logging is activated it can be used for early detection and elimination of potential vulnerabilities. On the other hand, logging can be used to detect violations against security specifications or to obtain more information about a security incident. For this, events which occur on the IT systems to be monitored are recorded.

Each organisation should define general rules as to how IT systems, networks, or applications must be logged. These rules must then be adapted to the specific systems and implemented accordingly. Different modules of the IT-Grundschutz catalogues about IT systems, networks, and applications contain more detailed information about the things to be considered when logging on the respective IT systems, for example in S 4.302 Logging for printers, copiers and all-in-one devices. The logging topic is described in detail in module S 5.22 Logging. The module deals with all specific threats and safeguards relevant in the fields of logging and monitoring regardless of the operating system used.

The time and effort required for drawing up and implementing such a process are considerable. Therefore, this module should first and foremost be implemented for larger information systems and if centralised logging is designed for an information system. For smaller, less complex information systems, implementing this safeguard is normally sufficient.

At first, a logging concept should be drawn up for the organisation. This concept defines how, where, and what is to be logged for which protection requirements. In general, each login using administrative rights should always trigger an entry to the log. The concept must also contain specifications as to what is to be done with the logged events, which is described in S 4.431 Selecting and processing relevant information for logging. Below, aspects that should be taken into consideration during the design phase are presented.

Centralised or local logging

Logging procedures aim at being able to comprehend significant changes to IT systems, networks, or applications in order to be able to maintain their security. Here, a differentiation between local and centralised logging can be made.

Within the framework of centralised logging, logged information generated by different IT systems is transmitted to a dedicated IT system and analysed there. This way, the events to be logged can be selected, filtered, and analysed at one location. Amongst other things, this provides the advantage of connecting and so being better able to detect security problems and attacks to different IT systems. The relevant aspects regarding the aforementioned are described in detail in S 3.90 General requirements for centralised logging.

Within the framework of local logging, the events to be considered remain on the IT systems they were generated on. There, the events are selected, filtered, and analysed. The alarm triggered when a certain event occurs is also triggered in a decentralised manner by the respective IT systems.

When planning the logging procedure, the decision as to whether occurring events are to be logged locally or in a centralised manner must be made for the different IT components. In general, using centralised logging is recommendable. However, centralised logging is not supported by all IT systems.

Planning the logging procedure

Logging steps
Figure: Logging steps

Depending on whether logging is performed locally or in a centralised manner, different steps may be required. These must be taken into consideration in the logging concept and include:

Confidentiality and integrity of the logged events

Some data sources generate log messages allowing for specific allocation to a person. Therefore, it should be guaranteed that only authorised persons may read the logged events. It should not be possible either that logged events can be deleted or changed subsequently by unauthorised persons. This must only be done by persons logged in with an auditor role, for example. If technically feasible, the administrator roles should not be able to delete or change data either.

Therefore, any access by unauthorised persons must be prevented by means of the corresponding file system rights. The events should also be protected even during the transmission of logged data in the event of centralised logging, for example by means of encryption or by transmitting the data using a separate administration network (out-of-band management). This way, the protection of the integrity and confidentiality of the log messages during transmission is increased as well.

In the event of higher protection requirements it must be checked whether the logged events are written to a WORM medium ("Write Once Read Many"). These data media can only be written once so that any subsequent changes to written data media are impossible.

Time synchronisation

In order to be able to detect attacks to IT systems, networks, and applications or their malfunctions, the same time should be configured on all IT systems and virtual instances. A centralised time server must be used in order to ensure that all systems have the same time even if the information system is large. This server provides the central time interval using the Network Time Protocol (NTP), for example (see S 4.227 Use of a local NTP server for time synchronisation). Any further systems within the information system can synchronise using this time interval.

Review questions: