Part 2 - A and A Derived Requirements

Video Activity

This lesson covers the Derived Security Requirement for Auditing and Accountability and discusses: • 3.3.3 • 3.3.4 • 3.3.5 • 3.3.6 • 3.3.7 • 3.3.8 • 3.3.9

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Difficulty
Intermediate
Video Description

This lesson covers the Derived Security Requirement for Auditing and Accountability and discusses: • 3.3.3 • 3.3.4 • 3.3.5 • 3.3.6 • 3.3.7 • 3.3.8 • 3.3.9

Video Transcription
00:04
All right now we've talked about the basic security requirements, and now we're going to talk about the derive security requirements for auditing and accountability. So first of all, we're gonna review and update audited events. One of the things that you'll notice its administrators have A.
00:23
They tend to go back in review audit logs when an event has happened, as opposed to proactively. So what we want is a regular schedule that we can use to go in. Review these audited events to make sure we're still auditing the things that need to be or we can update those requirements. But we need to review this on a regular basis.
00:43
We also want to make sure that we're notified
00:46
in the event of an audit process failure, meaning, if we're tryingto audit a specific activity and for some reason, the audit logs full and that can't be documented or there's some sort of failure in the audit process. We need to be notified
01:02
3.35 Correlate audit review analysis and reporting process is for investigation and response to indications of inappropriate, suspicious or unusual activity, meaning we need a process in place. We need to make sure that audit logs air reviewed
01:21
and then they're analyzed. And then what? The information.
01:23
Ah, that we learned from there then becomes reported or processed as a report. And many times people set up audit logs based on the default settings.
01:34
And in some instances, those default settings could even generate so much audit activity that I can't really sit through that information and find out what's meaningful. As a matter of fact, there have been there was a retail store I won't name names. Ah, that had a huge compromise of over 80
01:53
1,000,000
01:55
credit card numbers lost. That's a tremendous amount of numbers, but they had auditing in place. They had a data loss prevention system. But what happened is it wasn't configured, at least in my opinion, very well, because thousands and thousands of audit entries
02:15
and it was like looking for a needle in a haystack. When you have those really significant events,
02:20
um, so along with that, provide audit reduction and report generation so that we can have on demand analysis. Once again, these audit logs, especially in a large enterprise, can generate a lot of activity.
02:36
Not all of it's meaningful. So how do we sift through that? Look for security related events,
02:40
and also how do we handle? There's escalated security events. So we have two core like that provided information system capability that compares and synchronizes internal system clocks with an authoritative source of time server to generate time stamps for audit records.
03:00
You know, um, many operating systems now, rather than allowing users to configure date in time, they pull that information down from an Internet time server
03:08
that provides us consistent, safer audit loads, but also for our investigations. If we have evidence we want admissible in court, we need a, um,
03:20
a legitimate and trusted time Serves
03:23
all right 3.38 Protect audit information and audit tools from unauthorized access modification in deletion. You know, an attacker loves to scrub away or loves to clean up their tracks afterwards,
03:38
so we want to make sure that our log files are protected two right ones media and making sure the tools that would modify
03:46
ah those accounts or generate reports based on their zone it logs. We need to make sure that they're secured and protected, and that access is extremely limited. Toe authorized individuals
03:58
All right, 3.39 Limit management of audit functionality to a subset of privileged users on Lee. A few very select users should have the privilege of managing the audit function. Users shouldn't be able to turn on and turn off all the day war
04:15
modifier, restrict what's being audited that should be set up. My system of network administrator, security administrator and regular users should not
04:25
be able to modify that. So, basically, uh, with their drive security requirements were working on making sure we utilize thes audit logs, and we protect the integrity in the sanctity of what's in those articles.
Up Next
Part 1 - CM Basic and Derived
Part 2 - Maintenance Basic
Part 3 - Maintenance Derived
I and A Basic Requirements
IR Basic and Derived