S 4.47 Logging of security gateway activities

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

It must be defined which events are logged and who evaluates the logs. Logging must comply with the legal provisions applicable in each case. For logged data, the purpose limitation according to § 14 BDSG must be observed in Germany in particular.

The following items should be taken into consideration for the use of the logging function on the security gateway:

For small networks where only a simple security gateway is used, an additional log host may not be required.

Extent of logging on the packet filter

Logging on the packet filter should at least include all packets rejected based on a packet filter rule.

Depending on the security requirements, additional classes of packets may be worthwhile:

Which classes of packets are logged additionally depends first and foremost on the protection requirements of the trustworthy network. However, logging alone does not increase the security, but the information must also be evaluated according to corresponding criteria.

At least the following information should be logged for the packets for which logging is desirable:

If an ALG is used in addition, logging the accepted packets is not necessary, since the proxy usually logs sufficient connection information in this case.

Extent of logging on the application level gateway

On the ALG, protected against the majority of inadmissible packets by the outer packet filter, the following data should be logged for every (successful or attempted) connection establishment:

It must be possible to switch off the logging function for certain users so that important information is not overlooked due to too high a number of log entries. This selection may be made based on the rights profile of individual users, for example.

Moreover, the following settings are recommended for the individual logs:

DNS

Normally, zone transfers are prevented by the operator of the DNS server so that these checks can be dispensed with.

FTP

HTTP

NNTP

SMTP

No specific logging is required for the following modules:

Module Reason for discontinuation of logging
HTTPS Is connected "in series" with an HTTP proxy which already carries out logging.
Maintenance module Relevant logged data is not generated.
IDS Logged data is delivered separately on the IDS. This data should not be stored centrally in order to prevent the modules of the security gateway from being bypassed.

Table: Modules without separate logging

Logging is greatly simplified if the software allows free configuration of the "logging facility" (i.e. identification of the individual log entries). This way, it is possible to assign an unambiguous ID to every service the log host can use in order to distribute the logged data to different files.

If the logged data is sent to a central log host using the network, it must be ensured that the log entries of different computers and services are identified in such a way that they can be assigned unambiguously. Additionally, it makes sense that all services provide their logged data with consecutive numbers. This way, the loss and/or manipulation of logged data can be detected.

Evaluation of the logged data

The evaluation of the logged data may be supported by specific tools (log file analyser). These show the log files in different ways with most tools using regular expressions in order to extract relevant data from the log files. Although there are lists containing reasonable regular expressions for the purpose of logged data evaluation, adaptations are usually required in the individual cases.

Examples for different outputs of the log files include:

Along with the pure representation of relevant logged data, there are tools allowing for actions depending on a recognised abnormality (e.g. execution of a command).

Conspicuous log entries include, for example:

The log files must be evaluated regularly and it should be defined which evaluations should be performed as a minimum. Moreover, at least rough guidelines should be defined as to which steps must be taken if conspicuous entries are found within the framework of the evaluation.

Review questions: