SlideShare a Scribd company logo
1 of 5
Trends in Database Log Management

Anton Chuvakin, Ph.D.

WRITTEN: 2007

DISCLAIMER:
Security is a rapidly changing field of human endeavor. Threats we face literally
change every day; moreover, many security professionals consider the rate of
change to be accelerating. On top of that, to be able to stay in touch with such
ever-changing reality, one has to evolve with the space as well. Thus, even
though I hope that this document will be useful for to my readers, please keep in
mind that is was possibly written years ago. Also, keep in mind that some of the
URL might have gone 404, please Google around.


Introduction: Why Database Logs Fall In The Realm of Database Security

        Buried deep within enterprise IT infrastructures, databases can be said to
hold the “crown jewels” of an organization. Unfortunately, database security is
often lacking, leaving sensitive, business-critical information such as customer
data, financial details, and more, vulnerable to hackers. Dept of VA, TJ Maxx, TD
Ameritrade – these are just a few of the many organizations that have driven the
media wild over data security breaches in the last year.
        It is common that database administrators (DBAs) are assigned the task of
database security, but this is an issue that should be of utmost importance to any
business that wants to stay in business. TJ Maxx reported at least 45.7 million
credit and debit card numbers stolen over a period of several years, costing the
company an estimated $168 million [or whatever other large random number ].
Proper security measures may not have stopped the initial hack-in, but perpetual
data theft could have been avoided through careful log collection and analysis.
This article will not only discuss the importance, challenges and benefits to
database logging, but will also offer a few forward-looking trends to managing
your database logs.


About Logs and Database Logging

       Databases are now becoming one of the most voluminous log generators
in the enterprise – rivaling firewalls for the top spot. Most databases (ie: Oracle,
Microsoft SQL Server, IBM DB2, MySQL, etc.) will log system starts, stops and
restarts by default, but database logging isn’t merely about “keeping the system
running,” particularly when your databases contain sensitive, private information.
Security and compliance requirements must therefore be considered when
configuring your database and managing your logs. In fact, regulations such as
PCI, HIPAA, and FISMA all mandate log monitoring, with SOX strongly
recommending it as a best practice.
       Database logging thereby becomes an essential (and required)
component of database security – and it makes sense to not only focus on
“keeping the bad guys out,” but also take a “what’s going on in here?” approach.
After all, you may not know who the “bad guys” are. Logs can provide a
continuous fingerprint of everything that happens in your IT systems and with
your data and will point you to the “who, what, when, where” information of any
breach – whether the malicious behavior comes from outside hackers, a
disgruntled employee, or another source.
       Database security is a task often assigned to DBAs, not because they’re
security experts, but because they know the in’s and out’s of databases. If
configured properly, databases may be logging overwhelming amounts of files,
perhaps up to gigabytes of data per day. Typical database log events may
include:

   •   User logins and logouts
   •   Database system starts, stops and restarts
   •   Various system failures and errors
   •   User privilege changes
   •   Database structure (metadata) changes
   •   Most other DBA actions
   •   Select or all database data access (if configured to be so)

       As we know, hackers are always looking for new ways to break through
security barriers to access your sensitive information and all preventative security
measures fail at some point. Thus, since you are not able to guard against every
malicious hacker, logs will at least allow you to detect such security breaches as
well as actually figure out how it was done during the incident investigation. At a
minimal level, logs must be collected and archived, but log analysis does make
the data significantly more useful. In more explicit terms, log monitoring and
management should include:

   •   Collection: Gathering log data where it is being generated via an agent or
       remotely
   •   Transfer: Securely transmitting log data to a central server for analysis
       and storage
   •   Alerts: Issuing real-time alerts to database administrators if needed
   •   Reporting and Analysis: Providing reports and analytics based on log data
   •   Storage: Securely storing logs as long as prescribed by your retention
       policy and then, just as safely, destroying them

       The above examples for managing your log data will help you keep tabs
on the activities occurring in your business. Regularly collecting log data is a best
practice for incident response and can save you during crunch time after a server
crash, data theft, or surprise visit by your friendly auditor. Alternatively, if
someone is downloading an entire table or changing a database schema while
being logged on from a remote connection, a real-time alert will catch your
attention. Further, reports may help you track and analyze login failures and
successes, or after hours access, to better evaluate insider privilege abuse. In
other words, database logs can help you catch unusual behavior before a
problem gets out of hand and into headline news.


Database Log Management: Where to Begin

        If you are just beginning to set up a method for managing your database
log data, be ready for a large volume of log records as well as issues pertaining
to log availability and log format complexity. Log formats can be verbose and
obscure, particularly in cases where a single message spans multiple lines,
making it difficult to extract useful, actionable information via automated tools.
        Other challenges to database logging include decreased performance and
storage restrictions. Unlike other situations where logging has a minimal impact
on system performance, database audit logging slows down the database,
sometimes significantly. High-performance databases are built to provide
thousands of data transactions per second, logging all of these presents a
challenge to system IO as well as CPU and disk storage resources. Since many
regulations specify a 3-12 month period for log retention, plus a longer period for
log retention on tape or another dedicated storage tool, database logging is
typically getting a bad rap among DBAs already spread thin for time and
resources.
        Because the difficulties associated with database log management can
seem overwhelming, it’s best to take things one step at a time. Start slowly and
build up your system from there. You’ll want to collect logs from multiple servers
at one central location to facilitate incident analysis and response. This will also
help prevent loss of log data during routine log rotations. To gain insight into
“What’s going on” internally, conduct periodic reviews of DBA activity logs – you
can then keep tabs on people entrusted with sensitive and/or private information
such as customer data or product inventory information.
        When beginning to organize and manage database log data, also keep in
mind that manual log analysis can cost a lot in terms of time, human resources,
etc. Popular database solutions such as Oracle, Microsoft SQL Server, MySQL,
and more, tend to offer various basic logging options, but none comprehensive
enough to really capture a continuous feed of database activity. By contrast, an
automated log management tool will not only free up DBA time for other
important database performance and security tasks, but can also be more
reliable and efficient than manually managing log data.

Further, with an automated LMI tool, you can schedule log collection to occur at
off hours when other database service operations, such as backups, are
happening so that database performance is undeterred during the workday.
Trends in Database Log Management

        Database logging often presents a new frontier for many security
practitioners – one that must be conquered. Given that historically many
databases were running without any data access and data change logging
disabled (as by default), the key trend is that this is finally beginning to change.
Why is it happening? There are two main drivers for this trend: PCI DSS
compliance requirements that apply to those who handle credit card data and the
proliferation of data breaches and data loss discussed above. The cost of data
loss investigations in the absence of detailed access logs is absurdly high!

What would happen next? As more people enable logging, the challenge of “what
to do with all that data?” will emerge. Handling log storage and controlling log
retention so that logs will be there when needed for the investigations will be the
next trend.

After that, database log analysis will become all the rage. Analyzing logs for
anomalies, suspicious user activities, unsafe administrator actions, privilege
abuse as well as good old hacking will require deployment of log management
tools with database-specific intelligence.

Further, logging guidance from IT “best practices” such as ITIL and ISO will
become the norm and we will reach the database logging nirvana, when logging
is enabled because “it is the right thing” and not only due to compliance
pressures or the latest data breach. Log collection and automated analysis will
become the norm as new a log management and intelligence (LMI) technologies
simplify managing the log flood as well as “making sense” of logs.

So, enabling logging is a good start, and taking small progressive steps towards
more in-depth log analysis can be greatly enhanced by deploying LMI platform.

LMI tools are becoming increasingly advanced and are now typically able to take
a deep dive in to log analysis and management. A good log management
solution will not only automate log data analysis, but also the whole lifecycle of
log management.

There is also an increasing trend in logging across the entire IT infrastructure –
firewalls, servers, network devices, applications, operating systems, other
sources of log data all produce logs! – all of which can be managed by an LMI
platform. In other words, jump on the logging bandwagon with your other system
administrators and balance your IT infrastructure with a log management system
that will work across multiple database servers, across various database types,
and with all other log producers in your organization. You will not only improve
performance and business continuity, but also be able to put database log data in
the context of other organizational log data to correlate IT activities with events
occurring in your business.



Conclusion

        Database log management is becoming a “best practice” for database
security – you should be aware of who is accessing or changing your data, when
they are accessing it, and where they are accessing it. Luckily, you can combine
database log management with other similar projects (such as firewall or Unix
server syslog management) and use a single automated LMI platform to enable
efficient and reliable log collection, reporting analysis, and retention. As long as
you grow your LMI deployment in phases, rather than trying to cover all logs on
day one, you will be on the path to overall greater IT security within your
organization.

ABOUT THE AUTHOR:

This is an updated author bio, added to the paper at the time of reposting in
2009.

Dr. Anton Chuvakin (http://www.chuvakin.org) is a recognized security expert in
the field of log management and PCI DSS compliance. He is an author of books
"Security Warrior" and "PCI Compliance" and a contributor to "Know Your Enemy
II", "Information Security Management Handbook" and others. Anton has
published dozens of papers on log management, correlation, data analysis, PCI
DSS, security management (see list www.info-secure.org) . His blog
http://www.securitywarrior.org is one of the most popular in the industry.

In addition, Anton teaches classes and presents at many security conferences
across the world; he recently addressed audiences in United States, UK,
Singapore, Spain, Russia and other countries. He works on emerging security
standards and serves on the advisory boards of several security start-ups.

Currently, Anton is developing his security consulting practice, focusing on
logging and PCI DSS compliance for security vendors and Fortune 500
organizations. Dr. Anton Chuvakin was formerly a Director of PCI Compliance
Solutions at Qualys. Previously, Anton worked at LogLogic as a Chief Logging
Evangelist, tasked with educating the world about the importance of logging for
security, compliance and operations. Before LogLogic, Anton was employed by a
security vendor in a strategic product management role. Anton earned his Ph.D.
degree from Stony Brook University.

More Related Content

More from Anton Chuvakin

Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsFuture of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsAnton Chuvakin
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?Anton Chuvakin
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinAnton Chuvakin
 
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...Anton Chuvakin
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinAnton Chuvakin
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothAnton Chuvakin
 
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022Anton Chuvakin
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton ChuvakinAnton Chuvakin
 
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC TrendsAnton Chuvakin
 
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC Anton Chuvakin
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020Anton Chuvakin
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton Chuvakin
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)Anton Chuvakin
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationAnton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinAnton Chuvakin
 

More from Anton Chuvakin (20)

Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsFuture of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
 
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
 
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
 
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
 
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
 
Generic siem how_2017
Generic siem how_2017Generic siem how_2017
Generic siem how_2017
 
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Trends in Database Log Management

  • 1. Trends in Database Log Management Anton Chuvakin, Ph.D. WRITTEN: 2007 DISCLAIMER: Security is a rapidly changing field of human endeavor. Threats we face literally change every day; moreover, many security professionals consider the rate of change to be accelerating. On top of that, to be able to stay in touch with such ever-changing reality, one has to evolve with the space as well. Thus, even though I hope that this document will be useful for to my readers, please keep in mind that is was possibly written years ago. Also, keep in mind that some of the URL might have gone 404, please Google around. Introduction: Why Database Logs Fall In The Realm of Database Security Buried deep within enterprise IT infrastructures, databases can be said to hold the “crown jewels” of an organization. Unfortunately, database security is often lacking, leaving sensitive, business-critical information such as customer data, financial details, and more, vulnerable to hackers. Dept of VA, TJ Maxx, TD Ameritrade – these are just a few of the many organizations that have driven the media wild over data security breaches in the last year. It is common that database administrators (DBAs) are assigned the task of database security, but this is an issue that should be of utmost importance to any business that wants to stay in business. TJ Maxx reported at least 45.7 million credit and debit card numbers stolen over a period of several years, costing the company an estimated $168 million [or whatever other large random number ]. Proper security measures may not have stopped the initial hack-in, but perpetual data theft could have been avoided through careful log collection and analysis. This article will not only discuss the importance, challenges and benefits to database logging, but will also offer a few forward-looking trends to managing your database logs. About Logs and Database Logging Databases are now becoming one of the most voluminous log generators in the enterprise – rivaling firewalls for the top spot. Most databases (ie: Oracle, Microsoft SQL Server, IBM DB2, MySQL, etc.) will log system starts, stops and restarts by default, but database logging isn’t merely about “keeping the system running,” particularly when your databases contain sensitive, private information. Security and compliance requirements must therefore be considered when configuring your database and managing your logs. In fact, regulations such as
  • 2. PCI, HIPAA, and FISMA all mandate log monitoring, with SOX strongly recommending it as a best practice. Database logging thereby becomes an essential (and required) component of database security – and it makes sense to not only focus on “keeping the bad guys out,” but also take a “what’s going on in here?” approach. After all, you may not know who the “bad guys” are. Logs can provide a continuous fingerprint of everything that happens in your IT systems and with your data and will point you to the “who, what, when, where” information of any breach – whether the malicious behavior comes from outside hackers, a disgruntled employee, or another source. Database security is a task often assigned to DBAs, not because they’re security experts, but because they know the in’s and out’s of databases. If configured properly, databases may be logging overwhelming amounts of files, perhaps up to gigabytes of data per day. Typical database log events may include: • User logins and logouts • Database system starts, stops and restarts • Various system failures and errors • User privilege changes • Database structure (metadata) changes • Most other DBA actions • Select or all database data access (if configured to be so) As we know, hackers are always looking for new ways to break through security barriers to access your sensitive information and all preventative security measures fail at some point. Thus, since you are not able to guard against every malicious hacker, logs will at least allow you to detect such security breaches as well as actually figure out how it was done during the incident investigation. At a minimal level, logs must be collected and archived, but log analysis does make the data significantly more useful. In more explicit terms, log monitoring and management should include: • Collection: Gathering log data where it is being generated via an agent or remotely • Transfer: Securely transmitting log data to a central server for analysis and storage • Alerts: Issuing real-time alerts to database administrators if needed • Reporting and Analysis: Providing reports and analytics based on log data • Storage: Securely storing logs as long as prescribed by your retention policy and then, just as safely, destroying them The above examples for managing your log data will help you keep tabs on the activities occurring in your business. Regularly collecting log data is a best practice for incident response and can save you during crunch time after a server crash, data theft, or surprise visit by your friendly auditor. Alternatively, if
  • 3. someone is downloading an entire table or changing a database schema while being logged on from a remote connection, a real-time alert will catch your attention. Further, reports may help you track and analyze login failures and successes, or after hours access, to better evaluate insider privilege abuse. In other words, database logs can help you catch unusual behavior before a problem gets out of hand and into headline news. Database Log Management: Where to Begin If you are just beginning to set up a method for managing your database log data, be ready for a large volume of log records as well as issues pertaining to log availability and log format complexity. Log formats can be verbose and obscure, particularly in cases where a single message spans multiple lines, making it difficult to extract useful, actionable information via automated tools. Other challenges to database logging include decreased performance and storage restrictions. Unlike other situations where logging has a minimal impact on system performance, database audit logging slows down the database, sometimes significantly. High-performance databases are built to provide thousands of data transactions per second, logging all of these presents a challenge to system IO as well as CPU and disk storage resources. Since many regulations specify a 3-12 month period for log retention, plus a longer period for log retention on tape or another dedicated storage tool, database logging is typically getting a bad rap among DBAs already spread thin for time and resources. Because the difficulties associated with database log management can seem overwhelming, it’s best to take things one step at a time. Start slowly and build up your system from there. You’ll want to collect logs from multiple servers at one central location to facilitate incident analysis and response. This will also help prevent loss of log data during routine log rotations. To gain insight into “What’s going on” internally, conduct periodic reviews of DBA activity logs – you can then keep tabs on people entrusted with sensitive and/or private information such as customer data or product inventory information. When beginning to organize and manage database log data, also keep in mind that manual log analysis can cost a lot in terms of time, human resources, etc. Popular database solutions such as Oracle, Microsoft SQL Server, MySQL, and more, tend to offer various basic logging options, but none comprehensive enough to really capture a continuous feed of database activity. By contrast, an automated log management tool will not only free up DBA time for other important database performance and security tasks, but can also be more reliable and efficient than manually managing log data. Further, with an automated LMI tool, you can schedule log collection to occur at off hours when other database service operations, such as backups, are happening so that database performance is undeterred during the workday.
  • 4. Trends in Database Log Management Database logging often presents a new frontier for many security practitioners – one that must be conquered. Given that historically many databases were running without any data access and data change logging disabled (as by default), the key trend is that this is finally beginning to change. Why is it happening? There are two main drivers for this trend: PCI DSS compliance requirements that apply to those who handle credit card data and the proliferation of data breaches and data loss discussed above. The cost of data loss investigations in the absence of detailed access logs is absurdly high! What would happen next? As more people enable logging, the challenge of “what to do with all that data?” will emerge. Handling log storage and controlling log retention so that logs will be there when needed for the investigations will be the next trend. After that, database log analysis will become all the rage. Analyzing logs for anomalies, suspicious user activities, unsafe administrator actions, privilege abuse as well as good old hacking will require deployment of log management tools with database-specific intelligence. Further, logging guidance from IT “best practices” such as ITIL and ISO will become the norm and we will reach the database logging nirvana, when logging is enabled because “it is the right thing” and not only due to compliance pressures or the latest data breach. Log collection and automated analysis will become the norm as new a log management and intelligence (LMI) technologies simplify managing the log flood as well as “making sense” of logs. So, enabling logging is a good start, and taking small progressive steps towards more in-depth log analysis can be greatly enhanced by deploying LMI platform. LMI tools are becoming increasingly advanced and are now typically able to take a deep dive in to log analysis and management. A good log management solution will not only automate log data analysis, but also the whole lifecycle of log management. There is also an increasing trend in logging across the entire IT infrastructure – firewalls, servers, network devices, applications, operating systems, other sources of log data all produce logs! – all of which can be managed by an LMI platform. In other words, jump on the logging bandwagon with your other system administrators and balance your IT infrastructure with a log management system that will work across multiple database servers, across various database types, and with all other log producers in your organization. You will not only improve performance and business continuity, but also be able to put database log data in
  • 5. the context of other organizational log data to correlate IT activities with events occurring in your business. Conclusion Database log management is becoming a “best practice” for database security – you should be aware of who is accessing or changing your data, when they are accessing it, and where they are accessing it. Luckily, you can combine database log management with other similar projects (such as firewall or Unix server syslog management) and use a single automated LMI platform to enable efficient and reliable log collection, reporting analysis, and retention. As long as you grow your LMI deployment in phases, rather than trying to cover all logs on day one, you will be on the path to overall greater IT security within your organization. ABOUT THE AUTHOR: This is an updated author bio, added to the paper at the time of reposting in 2009. Dr. Anton Chuvakin (http://www.chuvakin.org) is a recognized security expert in the field of log management and PCI DSS compliance. He is an author of books "Security Warrior" and "PCI Compliance" and a contributor to "Know Your Enemy II", "Information Security Management Handbook" and others. Anton has published dozens of papers on log management, correlation, data analysis, PCI DSS, security management (see list www.info-secure.org) . His blog http://www.securitywarrior.org is one of the most popular in the industry. In addition, Anton teaches classes and presents at many security conferences across the world; he recently addressed audiences in United States, UK, Singapore, Spain, Russia and other countries. He works on emerging security standards and serves on the advisory boards of several security start-ups. Currently, Anton is developing his security consulting practice, focusing on logging and PCI DSS compliance for security vendors and Fortune 500 organizations. Dr. Anton Chuvakin was formerly a Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic as a Chief Logging Evangelist, tasked with educating the world about the importance of logging for security, compliance and operations. Before LogLogic, Anton was employed by a security vendor in a strategic product management role. Anton earned his Ph.D. degree from Stony Brook University.