Time
5 hours 54 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Description

This lesson focuses on monitoring and auditing. Monitoring involves the continuous observation of a software post-installation to make sure it is properly working and meeting all the requirements specified by the contract. Monitoring also ensures software remains secure. There are five elements of good monitoring: • Consistency • Quantitative • Objectivity • Relevance • Inexpensive Audits are very important in that they can be used to verify information after an event and can also be used to ensure policies are being followed and to make sure individual accounts are in compliance with the rules and regulations of an organization.

Video Transcription

00:04
now the next topic that we want to cover once the software has gone out into production, it's in the day to day environment is we want to monitor the software. We've already alluded to this a little bit. We want to make sure that it's continuing to provide the functionality as well as the protection that it was designed to provide
00:23
early on when it was first installed.
00:25
So we wanna look and make sure that we continue to meet our compliance requirements. Monitoring also shows that we've gone through due care and due diligence. And if you're not familiar with those terms, um, just let me give you a cheapie definition of those
00:41
due diligence is research Duke. Here is action.
00:45
Okay, Due diligence is research. Duke hears action. Now, please don't take those definitions back to law school with you,
00:53
but it's a good cheapie definition for what we mean. So, for instance, being aware of the security regulations for my industry, that's due Diligence II research. And I'm aware of the fact that we have to protect the privacy of patient health care information. That's due diligence.
01:11
The problem is just knowing that doesn't really do anybody any good. I have to follow that knowledge up with Duke here, where I use certain policies to protect that our I devise certain policies to protect the privacy of patient health information. So due diligence is the research
01:30
Duke. Here is the action,
01:30
and I'm showing both due diligence and do care by monitoring my network for compromises but also with specific applications once they've been installed. I want to make sure that that application is continuing to maintain the degree of security that's necessary. And there haven't been any compromises I may
01:51
also
01:51
continue to audit is I'm looking to collect information. Um, maybe we're looking at prosecuting an attacker. So we monitor access to and from a network resource, perhaps, and we might do so in such a manner that we're collecting information
02:09
in a forensically sound
02:12
means we really have to have very thorough process is on how we're gonna monitor the network and how we're gonna collect this information because especially if we're looking to collect evidence to use in a court of wall, there's a very particular, very specific ways that we have to do that. It's a big concern. So we want to make sure that if we are looking to provide
02:31
forensically sound evidence collection
02:35
that we've been trained to do, so
02:38
all right. Also, we may just want to be making sure that our mechanisms air still configured properly and that they're still providing the level of security that we thought or that we've decided would meet the requirements. So many different reasons to monitoring. It's just ongoing. We're keeping an eye on the application. We're doing a series of tests,
02:58
you know, based on a
02:59
predefined, a sort of schedule, if you will, to make sure we're still getting the functionality out of software that we need.
03:07
All right, other things. We want to make sure that the security aspects of the product they're still working and again any time we say the security aspects, think the C. I. A. Triad confidentiality, integrity and availability.
03:21
Um, we want to make sure that any sort of external threats have been detected or able to be detected. You know, not every threat is successful. Many attacks also aren't just one time attacks, so we may notice that there's been some sort of
03:39
reach, and even though in an attacker may not still be on the network. Currently,
03:44
there may be mechanisms that would allow that attacker to come back onto the network, and certainly we would always want to be aware of any sort of compromise that we've had. So we're gonna continue to monitor from a performance from a functionality standpoint, but also, essentially from a security standpoint as well
04:01
will monitor network to make sure road
04:04
devices haven't been added. You know, if you've got a live report in the wall like very easily set up a D h C P server that would provide I P addresses for hosts on your network and D H E P is a service that isn't very secure natively. So that's fairly easy to do.
04:23
So ultimately, all those reasons you can think of monitoring the network again. Is it functioning as it should? Has the threat landscape changed? Are there new risks? And how's the application? Responding to these new risks isn't configured properly. Your policies being followed. All of those ideas are perfectly relevant
04:42
for why we monitor,
04:44
um, when we monitor, we want to collect information and we want these metrics or this piece of information that we obtained that we document to be good quality metrics. We want the metrics to be consistent, quantitative. We want them to be jet.
05:01
We want them to be relevant and inexpensive.
05:05
So when we go through these elements, these five elements consistency
05:11
meaning If I go back and sample the same data set,
05:15
the results should be the same or they should be equivalent.
05:17
So if I keep going back to the same data elements, I shouldn't get a variation between, you know, element. Uh, you know, element A. Now an element A in five minutes.
05:30
We want our metrics to be quantitative. Earlier, when we talked about risk analysis, we said, There's qualitative analysis and there's quantitative analysis.
05:40
So when I ask you how well a piece of software is performing, you know, a qualitative response would be I was doing pretty well. It's pretty effective.
05:50
What I want instead is I want a quantitative response. I want something that's objective, and I want it to be New American nature. You know, we've seen a 3% decrease in successful attacks over the last quarter. You know that information is much more meaningful to me. So quantitative it's gonna be
06:09
precise. It's gonna be objective. It's gonna be a new mirror.
06:14
We certainly want the information that we collect to be unbiased or objective in nature.
06:19
Sometimes you know, Microsoft gives us a 1,000,000 tools to monitor their Microsoft systems. And sometimes you wonder how objective you know the performance tools are and the reliability tools are when it's a Microsoft product, you know, analyzing or evaluating
06:39
another Microsoft product.
06:41
So we want third party monitoring tools so that we can be assured of that objectivity.
06:46
And then also, we want the tools to be inexpensive. Or, I think, better than saying inexpensive is We want the tools to be cost effective
06:55
that, based on a cost benefit analysis, we gained more than we spend. When we look at monitoring tools,
07:02
along with monitoring comes auditing, and we create our audit, polities out it policies, rather to track actions to a subject. So we're going thio configure an audit policy that is in line with their system and organizational policy to make sure these policies are being followed
07:24
to make sure that, um,
07:26
accounts are accumulating rights and permissions through something called Authorization Creek.
07:32
Um, I don't know if you're familiar with authorization Creed. But we have to go back and audit user accounts to keep this from happening, and I think I may have mentioned this earlier in the class. But what happens is that a user that's on the network, the longer they're on the network, especially as they're given different tasks to manage,
07:50
they tend to accumulate a lot of rights and permissions.
07:55
And then when I go to another department, I get additional rights and permissions heaped on my account.
08:00
However, what we miss a lot of times is revoking those earlier rights and permissions that are no longer necessary. And we call that authentication or authorization. We actually call it Authorization Creek.
08:13
So we have to audit those accounts another way that we could mitigate authorization. Authorization creep is through role based access control. We talked about that earlier, and we talked about you don't get permissions assigned to your user account. Your role has certain permissions assigned to it. Regardless of the role
08:31
that you're performing on the networks,
08:33
you get that, um, that set of permissions and access.
08:39
All right. Auditing also lets us check the accuracy and completeness of transactions. We won't pretend our audit laws and make sure that they haven't been modified because an attacker does like to go back and clean up his tracks so we would use hashes or message digests in order to guarantee the integrity of
08:58
those on it long.

Up Next

ISC2 Certified Secure Software Life-cycle Professional (CSSLP)

This course helps professionals in the industry build their credentials to advance within their organization, allowing them to learn valuable managerial skills as well as how to apply the best practices to keep organizations systems running well.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor