S 5.171 Secure communication with a centralised logging server

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

Within the framework of centralised logging, the information of the monitored IT systems and applications is transmitted to a centralised logging server over the network in order to be collected, analysed, and stored. Since the logged data may also contain personal information, it must be protected against unauthorised access (reading, changing, or deleting).

In order to prevent logged data from being tapped or manipulated while it is transmitted to the centralised logging server, the data can be transmitted either encrypted or using a separate administration network (out-of-band). This way, the integrity and confidentiality of the log messages are increased as well.

Confidentiality for sensitive information

Some data sources generate log messages allowing for specific allocation to a person. Therefore, it is important to be able to ensure the confidentiality of logged data also during transmission, for example by protecting the connection with the help of SSL (see S 5.66 Use of TLS/SSL) or by encrypting the data. A separate administration network (out-of-band) may also be helpful regarding the protection of the data during transmission.

Integrity and completeness of the logged data

If logged information is to be used in connection with IT early warning and in the field of computer forensics, it is important that neither evidence for security incidents nor the validity of the collected information is lost. Furthermore, there should be an authentication between the logging server and the IT system delivering the logged data. This way, man-in-the-middle attacks can be made more difficult and the data is not accidentally sent to unauthorised bodies. Therefore, mechanisms for protecting the integrity and authenticity of the transmitted and stored information must be provided.

Logged data must be correct and complete. This is required both for the validity and from a technical point of view.

Since larger information systems often generate large amounts of logged data, it must be ensured that the bandwidth is sufficient in order to transmit the logged information and to prevent any loss of logged information caused by temporary bandwidth bottlenecks. It must also be ensured that the transmission of the logged data does not impair the transmission of the user data. The log messages can be transmitted using a separate administration network (out-of-band) instead of the actual data network (in-band). Depending on the protection requirements it should be considered whether it makes sense and is technically feasible to logically or physically separate the logged and the user data.

Examples for secure communication

The following safeguards demonstrate how the availability, integrity, and confidentiality can be ensured while logged data is being transmitted. The recommendations can be used both individually and in combination.

Review questions: