Consider the following example. A prestigious hospital in the UK must ensure that it aligns with all the regulations. You are part of the team responsible for ensuring compliance with the Data Protection Act (2018). One of the requirements is to ensure that patients’ records are kept confidential and protected against unauthorised processing, access, loss, or destruction. Consequently, the management provided the staff with substantial relevant training to raise awareness and equip them with all the necessary tools to ensure compliance. Does this mean that the hospital is now in compliance with the requirements of the Data Protection Act (2018), especially when handling patient records?
Policy violations come in various forms. Some staff might copy patient-related data using a USB flash memory for easy access. Others might dispose of confidential paper records without using the allocated paper shredders. Some might be taking photos of the computer screen to share it via unauthorised channels to make work “more efficient.” The examples are countless, and most of the “workarounds” might lead to violations of the applicable laws, which can lead to lawsuits against the hospital. We must ensure that everyone is doing their best to observe all laws and regulations to the best of their abilities.
We need some systematic and objective way to evaluate the hospital’s standing, i.e., auditing. We must regularly audit the processes and controls to ensure the hospital abides by all the related regulations and laws. Without auditing, there is no way to know what needs to be fixed.
In other words, when we ask questions such as: How can we know whether a company complies with the applicable laws and industry standards? How can we assess the effectiveness the risk management and internal controls? How can we detect fraudulent activities or misuse of resources? The answer lies in auditing.
What is Auditing?
In simple terms, auditing is like a check-up for a company or organisation. It involves carefully examining the company’s processes, internal controls, and financial statements to ensure everything runs smoothly according to the policies and laws. Auditors look for problems, such as errors, inefficiencies, or shady activities, and suggest ways to fix them. This helps the company improve its operations and builds trust with the people involved or affected by the organisation’s activities.
In more formal terms, auditing is a systematic, independent, and objective process of gathering and evaluating evidence to determine if an organisation, its policies, processes, controls, or financial statements comply with applicable laws, regulations, and industry standards.
What is Monitoring?
As per the title of this room, the focus is on auditing and monitoring. Before moving to the next task, let’s briefly explain monitoring. In information systems, monitoring is about continually checking a computer’s or network’s performance and behaviour. It involves watching over various components such as applications, storage, and networking to make sure they’re working well together. Monitoring also looks for unusual behaviour and checks if anything violates established rules or policies.
In this room, we will cover auditing and monitoring in more detail and visit related concepts such as logging.
Learn the following topics and differentiate between them:
This room has no rigid prerequisites; however, to carry out the tasks on the attached VMs, some knowledge of MS Windows and Linux is necessary. We recommend satisfying the following requirements:
- Basic knowledge of MS Windows.
- Basic knowledge of Linux.
- Knowledge of IAAA, Risk Management, and related concepts is encouraged but unnecessary.
Task 2 Audit Objectives and Types
In finance, auditing is an official inspection and verification of an organisation’s financial records, procedures, and statements to ensure accuracy, reliability, and compliance with applicable laws, regulations, and accounting standards. In simple terms, an audit aims to verify the financial records of individuals and businesses.
However, when it comes to information systems, auditing has a broader meaning as it goes beyond financial records and procedures. Auditing of information systems involves the systematic, independent, and objective examination of an organisation’s IT infrastructure, processes, and controls.
Furthermore, the audit of information systems has more encompassing objectives. The objectives of an information systems audit are to evaluate the effectiveness, security, and compliance of systems and data management within an organisation. By conducting an information systems audit, auditors can assess various aspects of an organisation’s IT infrastructure, processes, and controls.
By conducting an information systems audit, auditors can assess various aspects of an organisation’s IT infrastructure, processes, and controls. Some primary objectives of an information systems audit include the following:
- Assess the effectiveness of internal controls: This process can help mitigate the risk of fraud, errors, and other disruptions to the organisation’s operations.
- Identify and assess risks: This process can help the organisation develop and implement appropriate controls to mitigate risks to the organisation’s information systems.
- Assess the efficiency and effectiveness of information systems: This process can help the organisation improve the performance of its information systems and make better decisions about future investments in information technology.
- Ensure compliance with laws and regulations: This process can help protect the organisation from fines, penalties, and other legal sanctions.
More generally, information systems audits can be used for a broader set of targets, depending on the industry and regulations. In more formal terms, information systems audit serves the following objectives:
- Risk assessment: Identify potential risks and vulnerabilities that may affect information assets’ confidentiality, integrity, and availability and evaluate risk mitigation strategies in place.
- Regulatory compliance: Ensure that an organisation’s information systems adhere to relevant laws, regulations, and industry standards to avoid legal violations and safeguard the organisation’s reputation.
- IT governance: Evaluate the effectiveness of IT governance practices, including decision-making processes, resource allocation, and performance management within the organisation.
- Security management: Assess the effectiveness of an organisation’s information security policy, processes, and controls in protecting information assets from unauthorised access, use, modification, and disclosure.
- Operational and performance evaluation: Assess the controls and processes for key IT activities such as system design, development, implementation, and ongoing maintenance, ensuring that the organisation’s systems and resources are utilised efficiently and that desired goals and outcomes are achieved.
- Data management and quality: Evaluate the processes and controls for data storage, retention, backup, and recovery to ensure that critical data is accurate, complete, reliable, and available when needed.
- Business continuity and disaster recovery: Assess the adequacy of an organisation’s strategies for maintaining critical IT services and capabilities during various business disruptions, including assessing backup and contingency plans to ensure timely recovery.
- Fraud detection and prevention: Identify fraudulent activities or misuse of resources by examining user activity, authorisation, and the overall control environment.
By identifying potential vulnerabilities, weaknesses, or irregularities, IT auditors help prevent unauthorised access, data breaches, system failures, and legal violations, strengthening information security and ensuring the integrity, confidentiality, and availability of critical IT resources and information assets.
One way to classify audits is based on who is performing the audit:
- Internal audits: These are performed by an organisation’s personnel or staff members assigned to the internal audit function.
- External audits: External audits are conducted by independent auditors not employed by the organisation being audited. These auditors are typically from external accounting or auditing firms, and the primary purpose is to provide an impartial and objective review.
Generally speaking, we would start with an internal audit to verify that the company is carrying out the different procedures correctly. In the next stage, we would pay for an external audit to help discover what we might have missed with our internal team. If we don’t start with an internal audit, we will most likely need multiple external audits, which can get quite expensive.
In addition to internal and external audits, we have:
- Third-party audits: This type of audit is conducted when an organisation needs to assess its IT systems or controls within third parties, such as vendors, service providers, or subcontractors. Third-party audits ensure that the external entities a company relies on adhere to the required security, data protection, and compliance standards, thereby minimising potential risks and exposures that may arise from their operations.
An audit framework is a structured approach comprising principles, concepts, and practices used to conduct an audit. It provides guidelines on planning, executing, and reporting on an audit effectively and ensures that audits are objective and consistent. Audit frameworks help auditors assess an organisation’s policies, processes, controls, and compliance with regulations while providing efficiency, value, and transparency to the audit process.
Popular Audit Frameworks
- COSO: The Committee of Sponsoring Organizations of the Treadway Commission (COSO) is a private-sector initiative that develops frameworks for enterprise risk management, internal control, and fraud deterrence. COSO’s Internal Control-Integrated Framework is one of the most widely used frameworks for auditing internal controls. It is typically used in various industries, including financial services, healthcare, and government.
- COBIT: The Control Objectives for Information and Related Technology (COBIT) is a framework for the governance and management of information and technology (IT). It provides a comprehensive set of control objectives that can be used to assess the effectiveness of an organisation’s IT governance and management practices. It is typically used in various industries, including financial services, healthcare, and government.
- ISAE 3402: ISAE3402 is an international standard that provides guidance on the assurance of controls over financial reporting. Auditors use it to assure of the effectiveness of an organisation’s internal controls over financial reporting. It is typically used in various industries, including financial services, healthcare, and government.
- ISO 27001: ISO 27001 is an international standard for information security management. It provides a set of best practices for information security management. It is typically used in various industries, including financial services, healthcare, and government.
- ITIL: ITIL stands for Information Technology Infrastructure Library. It is a framework of best practices for IT Service Management (ITSM). ITIL is used in auditing to establish a systematic approach for assessing an organisation’s management and governance of IT services. By providing standard practices and criteria, ITIL helps organisations identify areas where their ITSM practices can be improved and to provide recommendations for how to make those improvements.
- PCI DSS: The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements for organisations that accept payment cards. It is designed to protect cardholder data from unauthorised access, use, disclosure, alteration, or destruction. It is typically used in industries that accept payment cards, such as retail, hospitality, and healthcare.
- SOX: The Sarbanes-Oxley Act of 2002 (SOX) is a federal law that establishes auditing and financial reporting requirements for public companies. It is designed to protect investors by improving the accuracy and reliability of financial reporting. It is typically used in public companies.
|COSO||Internal control framework that helps organisations design, implement, and monitor their internal controls.||All industries||COSO is a comprehensive framework that covers all aspects of internal control.|
|COBIT||IT governance framework that helps organisations align their IT with their business goals.||All industries||COBIT is a flexible framework that can be adapted to the needs of any organisation.|
|ISAE 3402||Assurance standard that provides assurance on the controls of a service organisation.||All industries||ISAE 3402 is a relatively new standard gaining popularity in the financial services industry.|
|ISO 27001||Information security management system (ISMS) standard that helps organisations protect their information assets.||All industries||ISO 27001 is the world’s most widely adopted ISMS standard.|
|ITIL||IT service management (ITSM) framework that helps organisations deliver high-quality IT services.||All industries||ITIL is a well-established framework that organisations of all sizes use.|
|PCI DSS||Payment Card Industry Data Security Standard that helps organisations protect cardholder data.||Financial services||PCI DSS is a mandatory standard for organisations that process credit and debit card payments.|
|SOX||Sarbanes-Oxley Act that sets requirements for internal controls over financial reporting.||Publicly traded companies||SOX is a complex law that has a significant impact on public companies.|
The process typically consists of the following primary stages:
- Planning: The auditor determines the audit’s scope, objectives, and timelines. This stage involves understanding the organisation’s IT environment – including infrastructure, systems, applications, security measures, and data management practices – and identifying potential risks and controls to be evaluated.
- Information gathering: The auditor collects relevant data, background information, and documentation to thoroughly understand the organisation’s IT processes and systems. This process typically involves interviewing key personnel, reviewing resource documentation, analysing procedures and policies, and examining the control environment.
- Risk assessment and control evaluation: The auditor identifies and assesses the risks and vulnerabilities within the organisation’s IT infrastructure, processes, and systems based on the information gathered. This process includes evaluating the effectiveness of internal controls, security measures, and compliance with applicable policies, regulations, and industry standards.
- Testing: The auditor performs detailed tests on selected systems, applications, specific processes or control procedures to validate their effectiveness, accuracy, and compliance. Testing methods may include data analysis, vulnerability scanning, penetration testing, controls testing, or sampling, depending on the audit objectives and the audited systems.
- Analysis and findings: The auditor analyses the testing and evaluation results, identifies deviations, irregularities, or vulnerabilities, and evaluates the implications. Auditors determine if systems are configured securely, IT processes are effective and compliant, or risks are adequately mitigated.
- Reporting: After the analysis, the auditor documents the findings and conclusions, makes recommendations for improvement where necessary, and prepares a formal audit report. This report is then shared with the management, the audit committee, or other stakeholders as required, helping them understand the organisation’s risk exposure, compliance, and effectiveness of IT processes and controls.
- Follow-up: In some cases, a follow-up may be performed to evaluate if the recommended improvements and corrective actions have been implemented and ensure their effectiveness in addressing the identified issues.
The following is a list of some areas that we might consider inspecting when performing an information systems audit:
- Information Systems Hardware: Inspect the hardware configuration and performance to ensure it meets the organisation’s needs.
- OS: Check the operating system configuration and security to ensure it is secure and compliant with organisational policies.
- File Systems: Check the file system permissions and access control to ensure that sensitive data is protected.
- Database Management Systems: Audit the database configuration and security to ensure it is secure and compliant with organisational policies.
- Network Infrastructure: Inspect the network configuration and security to ensure it is secure and compliant with organisational policies.
- Network Operating Controls: Audit the network operating controls to ensure that they effectively prevent unauthorised access to the network.
- IT Operations: Examine the IT operations to ensure they effectively deliver high-quality IT services.
- Lights-Out Operations: Check the lights-out operations to ensure they effectively manage IT infrastructure without the need for human intervention.
- Problem Management Operations: Audit the problem management operations to ensure that they effectively resolve IT problems in a timely manner.
- Monitoring Operations: Validate the monitoring operations to ensure they effectively detect and respond to IT incidents.
- Procurement: Check the procurement process to ensure that IT hardware and software are secure and compliant.
- Business Continuity Planning: Inspect the business continuity plan to ensure that it effectively ensures the continuity of critical IT services during a disaster.
- Disaster Recovery Planning: Examine the disaster recovery plan to ensure it effectively recovers critical IT services during a disaster.
Let’s say that we are auditing a company using COBIT. We might go through a series of steps that resemble the following:
Step 1: Planning
- Define the scope of the audit: We start by defining the scope of the audit and identifying the relevant COBIT domains that apply to the organisation’s IT governance practices.
- Identify the relevant COBIT controls: Next, we identify the appropriate COBIT controls that are in place to mitigate the risks identified in the scope of the audit.
- Develop an audit plan: We will need to develop an audit plan that outlines the steps that will be taken to gather evidence and assess the organisation’s compliance with the relevant COBIT controls.
Note: The COBIT 2019 framework defines 40 control objectives, which are grouped into five domains:
- Plan and Organise (PO): 13 control objectives
- Acquire and Implement (AI): 9 control objectives
- Deliver and Support (DS): 11 control objectives
- Monitor and Evaluate (ME): 7 control objectives
- Resilience (RES): 1 control objective
The details of the COBIT controls are beyond the scope of this room. However, for this exercise, we need to know that the COBIT controls provide a framework for ensuring that IT activities are aligned with the organisation’s strategic goals and objectives.
Step 2: Execution
- Gather evidence: We start this stage by gathering evidence of the organisation’s compliance with the relevant COBIT controls. This evidence may include documentation, interviews, and observations.
- Assess the evidence: Next, we assess the evidence to determine whether the organisation complies with the relevant COBIT controls.
Step 3: Assessment
- Identify gaps in compliance: First, we must identify gaps in the organisation’s compliance with the relevant COBIT controls.
- Make recommendations for improvement: Next, we can make recommendations for improvement to the organisation’s IT governance practices.
Step 4: Reporting
- Prepare the audit report: We begin by preparing an audit report summarising the audit findings and making recommendations for improvement.
- Communicate the audit report: Once the report is ready, we must communicate it to the organisation’s management and stakeholders.
Step 5: Follow-up
- Monitor the implementation of recommendations: Ideally speaking, we will be able to monitor the implementation of the recommendations made in the audit report to ensure that the organisation is taking steps to improve its IT governance practices.
The steps above show an example of an information systems audit using the COBIT framework. The exact steps involved in an audit will vary depending on the organisation’s needs and requirements. However, the general steps outlined above apply to most information systems audits.
In the following questions, consider the case where we divide the audit process into the following five stages:
Answer the following questions with the number of the related step.
Logging is the process of recording events as they take place on a computer system. These events can be:
- Problems and errors
- Information about current operations
Some of the purposes of logging are:
- Troubleshooting: Logs can be a valuable tool for troubleshooting errors. For instance, if a server fails to start, we would look at its logs to discover where it failed and what prevented it from starting.
- Monitoring: Logs provide plenty of insight into the utilisation of a system’s resources. Consider the case where a server is slow, and we want to discover the bottleneck affecting its performance. The system might run low on memory, or the CPU might reach 100% utilisation for non-trivial durations. Logs can provide the necessary insights to pinpoint and solve the problem.
- Auditing: Logs record users’ activities on a given system. On an audited system, we want to know who logged in, what files they accessed, and what changes they made. This information is necessary to audit a system or investigate any incident.
- Compliance: Logs can be a requirement to maintain compliance with relevant regulations. For instance, financial institutions need to keep logs of all financial transactions that take place.
Linux logs are an essential part of Linux system administration, as they provide a look into the system’s operation and reveal any issues that may be happening. This information can include errors, warnings, and security alerts, in addition to more innocuous events. Most Linux distributions store the log files and directories in
/var/log directory content is shown in the terminal below.
root@TryHackMe# sudo tree /var/log -d -L 2 /var/log ├── akmods ├── anaconda ├── audit ├── blivet-gui ├── chrony ├── cups ├── displaylink ├── gdm ├── glusterfs ├── httpd ├── journal │ └── f29b4ed41359484da9b7d3bf3ec279ac ├── libvirt │ ├── libxl │ ├── lxc │ └── qemu ├── ppp ├── private ├── qemu-ga ├── samba │ └── old ├── speech-dispatcher ├── sssd ├── swtpm │ └── libvirt └── vmware
The importance of Linux logs lies in troubleshooting and monitoring as they help admins identify suspicious activities, diagnose system hardware and software problems, track system health, and gauge performance. For handling logs, many Linux distributions use system logging daemons like
journald to manage, process, and store log events.
There are several different types of logs on a Linux system. Some common types of logs include:
- System logs: These logs contain information about the general health and operation of the system.
- Application logs: These logs contain information about the specific applications running on the system.
- Security logs: These logs contain information about security-related events, such as login and failed authentication attempts.
Managing Logs on a Linux System
To efficiently work with Linux logs, we need to consider the following:
- Log to a central location
- Use a tool to filter and parse the logs
- Setup alerts
Configuring a Linux system to log in to a central location is essential. This setup will make it easier to collect and manage our logs.
Additionally, using a tool that can filter and parse the generated logs would be best. This configuration will help us to find the information we need quickly and easily.
Finally, we should set up alerts to notify us of important events. This setup will help us respond to problems quickly.
Click on the Start Machine button to follow along. You will also need it to answer the questions at the end of this task. The machine will start in Split-Screen view. In case the VM is not visible, use the blue Show Split View button at the top-right of the page. Alternatively, you may also log into the attached VM over SSH using the command
ssh maxine@MACHINE_IP. The login credentials are:
Because all the commands require root or sudo privileges, you can issue
sudo su to get root access and avoid typing
sudo before each command.
One of the efficient command-line tools to audit system logs on a Linux system is
aureport. You can get a summary of the events using the command
aureport --summary. If you are only interested in the failed events, you can use
aureport --failed as shown in the terminal window below.
root@TryHackMe# aureport --failed Failed Summary Report ====================== Range of time in logs: 06/08/2023 12:18:12.635 - 07/06/2023 23:09:20.083 Selected time for report: 06/08/2023 12:18:12 - 07/06/2023 23:09:20.083 Number of changes in configuration: 0 Number of changes to accounts, groups, or roles: 5 Number of logins: 0 Number of failed logins: 87 Number of authentications: 0 Number of failed authentications: 421 [...]
We can quickly spot the high number of failed logins and authentications: 87 and 421. Please note that the number of failed authentications is higher than the number of failed logins, as one failed login results in multiple failed authentications, depending on the system setup. Let’s discover which account has a high number of failed logins.
The following command
ausearch --message USER_LOGIN --success yes --interpret returns successful logins, while
ausearch --message USER_LOGIN --success no --interpret returns the failed logins. The options are:
--messageis followed by the message we are interested in searching for. Examples include
--successis followed by
nodepending on whether you are searching for successful or unsuccessful attempts, respectively.
--interpretconverts numeric entities, such as UID (User ID), into text.
If we only want to display the failed login attempts for the
root account, we can pipe the output via
grep. The command becomes
ausearch --message USER_LOGIN --success no --interpret | grep ct=root.
The command above would result in a very long list. Since we are interested in counting the lines, we can pipe the output again through
wc is used for counting characters, words, and lines. The
-l will only display the line count. Consequently, a straightforward way to count the number of failed
root logins is by issuing the following command.
root@TryHackMe# ausearch --message USER_LOGIN --success no --interpret | grep ct=root | wc -l 76
The command above can be written in its short form as shown below:
root@TryHackMe# ausearch -m USER_LOGIN -sv no -i | grep ct=root | wc -l 76
The output above tells us that 76 failed login attempts have been at the root account.
Windows logs, sometimes referred to as event logs, form an integral part of the operating system’s functionalities, providing insights into system behaviour and potential issues. Four primary types include:
- System Logs: This records activity associated with the system components, such as driver failure, resource conflict, and hardware issues. For IT professionals, they serve as sources of critical diagnostics information.
- Application Logs: This type concerns individual software living upon the system. When issues manifest around a specific application, such as failing to connect to a database or process-related bottlenecks, these logs come in handy to determine why the failure occurred.
- Security Logs: Specialised logs designed to track security events. They touch on events such as logon and logoff actions, user rights assignments, policy changes, and security-related aberrations. For security professionals, this often represents their first check when investigating a security incident.
- Forwarded Events Logs: These logs receive collected from other tertiary-tertiary computing environments. They act as collated reports, pulling from multiple sources into a centralised file. They are ideal for monitoring tasks and analysis in a networked environment, where you may need to assemble data from various places into a cohesive analysis.
Correctly analysing Windows logs empowers administrators to address security issues promptly, facilitating strong performance and troubleshooting any potential problems efficiently.
The table below provides a short and basic comparison between Linux logs and Windows logs.
|Feature||Linux Logs||Windows Logs|
|Logging levels||Debug, Info, Notice, Warning, Error, Critical||Debug, Information, Warning, Error, Critical|
|Tools for viewing logs||Event Viewer|
|Advantages||More flexible, easier to parse||More user-friendly, more integrated with Windows|
|Disadvantages||Can be less intuitive, less centralized||Can be more difficult to troubleshoot|
Microsoft Windows makes it possible to audit various aspects of the system. Here is a list of example events you can audit:
- Account logon events
- Account management
- Privilege use
- Directory service access
- Policy change
- System events
For more information, we recommend you visit Audit Policy.
Windows Event Viewer
Click on the Start Machine button to follow along. You will also need it to answer the questions at the end of this task. You can log into the attached VM using a Remote Desktop client via the AttackBox or your VPN Connection. The login credentials are:
Let’s start the Event Viewer, then open Security under the Windows Logs. We can see the different events that have occurred, including those we configured MS Windows 2019 to log as part of auditing. In the screenshot below, we have selected an event with ID 4624, i.e., a user has successfully logged in to a system.
Click to enlarge image.
The table below shows some example logon event IDs.
|4624||A user successfully logged on to a computer.|
|4625||Logon failed due to an unknown username or a wrong password.|
|4634||The logoff process was completed.|
|4647||A user started the logoff process.|
|4779||A user disconnected from a remote session without logging off.|
Information systems monitoring involves continuously observing and checking an IT system’s performance and metrics. It can include reviewing processes, users, workflows, transactions, data storage, applications, servers, networks, and security protocols. It’s a proactive technical system that helps identify potential disruptions before they cause serious issues or system shutdowns.
Monitoring is crucial for several reasons:
- Troubleshooting and Maintenance: Monitoring data helps IT support teams identify and rectify operational faults more efficiently, ensuring systems run smoothly and effectively with minimum downtime.
- Performance Optimisation: By keeping track of information usage, transmission rates, and latency, fine-tuning strategies can be applied to optimise the performance of the systems.
- Preventing Failures: Proactively spotting potential issues or irregular patterns, such as close-to-capacity servers or faulty hardware, forms a significant aspect of preventing more significant failures.
- Security Risk Mitigation: Continuous monitoring helps identify unauthorised access, security breaches, or malicious activity, enabling immediate reaction and thus enhancing system security.
- Regulatory Compliance: Continuous monitoring is crucial for organisations under regulatory controls to meet and prove compliance with data protection and privacy laws.
Logging, on the other hand, is a form of data collection and a record-keeping activity. A log typically records events or activities that software or systems perform, as discussed in the previous tasks.
While both involve in-depth analysis of system behaviour, the key difference between logging and monitoring lies in their primary functions and use. Logging provides a historical account of events for later analysis or audit review; it is essential for diagnostic, forensics, and compliance purposes. Monitoring is a real-time, continuous process used to detect issues or anomalies immediately; it ensures effective operational control, security, and optimal performance.
|Primary Function||To record system activities for later review||To deliver real-time observation of system status|
|Error Detection||After it hits, provides a data trail to backtrack the issue||Identify and notify irregularities as they occur|
|Process||A constant, passive process recording activities and system changes||An active, ongoing process receiving alerts or warnings based on predefined triggers|
|Typical Uses||Error diagnostics post-issue, compliance proof, audit trails, forensic analysis||Daily operational tracking, preventative maintenance, bottlenecks detection, real-time functionality and security|
|Timeliness of Notification and Inspection||Used primarily for retrospective analysis of problems||Real-time reporting of potential issues|
|Key Objectives||Error diagnosis, accountability and providing detailed context||Eradicate small issues from escalating and becoming larger problem|
Overall, effective information systems monitoring fosters a stable IT infrastructure that is key to an organisation’s technological development, resilience, and integrity.
Security Information and Event Management (SIEM) is a set of integrated management technologies that provide a holistic view of an organisation’s information security. SIEM systems collect and aggregate log data generated throughout the organisation’s IT infrastructure from network devices, systems, and applications.
SIEM software then identifies and categorises incidents and events and analyses them. This analysis can be beneficial for identifying issues such as security threats, compromised systems, and malicious activities. It can also help with potential incident response actions.
The key capabilities of SIEM technology include:
- Data Aggregation: It can collect data from many sources, such as network devices, security controls, servers, and databases, providing a global perspective of the IT environment.
- Correlation and analysis: SIEM systems can correlate different events and logs to see patterns of possible malicious activity.
- Alerting and reporting: Based on the analysis performed on data, SIEM can automatically raise alerts upon identifying any abnormal activity and create dashboards/reports for IT administrators.
- Forensic Analysis: It helps perform historical analysis against the event data for investigating and mitigating cyber threats.
- Threat intelligence Feeds: Many SIEM tools integrate threat intelligence feeds to enhance incident detection and proactively identify external threats.
- Automation and Orchestration: Some sophisticated SIEMs will also have capacities to automatically respond to some detected incidents, for example, by blocking IP addresses or deactivating vulnerable services.
SIEM is a vital tool for ensuring compliance with internal and external security policies and maintaining a solid security posture across an organisation.
Logging, monitoring, and auditing are critical components of data management and cyber security strategies.
Logging captures detailed event records about system operations, often serving as the first point of reference in troubleshooting or system optimisation.
Monitoring is a real-time continuation of the logging process, offering immediate glimpses into system health and performance and the capacity to identify potential problems before they escalate.
On the other hand, auditing provides a systematic review of logs and monitoring histories necessary for regulatory compliance. It helps identify discrepancies or issues, attributing accountability for system actions. Notably, logging, monitoring, and auditing foster a system environment with enhanced security, credibility, performance, and regulatory integrity.
Below is a summary table comparing logging, monitoring, and auditing.
|Definition||Recording of system activities and changes||Real-time data and report collection to observe system status||Systematic analysis and review of actions within the systems|
|Main function||Stores a historical account of system processes, activities, or events||Records and visualises the live state of systems||Checks compliance with set IT standards and corrective actions|
|Result identification||Often post-issue or upon check||Real-time, at the time of anomaly or breach||Usually post-action, during compliance checks|
|Process flow||Operates passively to collect data as events transpire||Active process analysing and inspecting system performance regularly||Performed at set times, often periodic, can be triggered by events|
|Uses||Find faults, debug, forensics, assists in audits||Maintain system performance, real-time fault-tracking, foreseeing issues||Validate regularity, safety inspection, prove accountability and lessening potential risks|
|Key Role||Data gathering and accountability||Preventive and predictive maintenance||Compliance, verification, and legal professionalism|