AUDITING AND
ACCOUNTABILITY
THE NEED FOR ACCOUNTABILITY
Even though we allowed a
party to access a resource,
we need to ensure that they
behave in accordance with
rules set.
DATA SECURITY
identification
Authentication
Authorization
Control
Accountability
ACCOUNTABILITY
• Provides the means to trace activities in our environment
back to their source.
• Depends on identification, authentication, and access
control being present so that one can know who a given
transaction is associated with and what permissions were
used to allow them to carry it out.
• Providing sufficient controls in place to deter or prevent
those that would break the rules and abuse the resources
they have access to
SECURITY BENEFITS OF
ACCOUNTABILITY
• NONREPUDIATION
• Refers to a situation in which sufficient evidence exists to prevent
an individual from successfully denying that he or she has made a
statement, or taken an action.
• Example :
system or network logs
SECURITY BENEFITS OF
ACCOUNTABILITY
• DETERRENCE
• If those monitored are aware that they are monitored and has
been communicated to them that there will be penalties for acting
against the rules, these individuals may think twice before straying
outside the lines.
SECURITY BENEFITS OF
ACCOUNTABILITY
• INTRUSION DETECTION AND PREVENTION
• example
implementation of alerts based on unusual activities in our
environment and check information we have logged on a regular
basis
SECURITY BENEFITS OF
ACCOUNTABILITY
• ADMISSIBILITY OF RECORDS
• It is often much easier to prove admissibility when records are
produced from a regulated and consistent tracking system. This
means the organization can provide a solid and documented chain
of custody for said evidence such as showing where evidence was
at all times, how exactly it passed from one person to another,
how it was protected while it was stored and so on.
AUDITING
• A methodological examination and review of resources
• Provides with data which can be implemented for
accountability
WHAT DO WE AUDIT
• Password
• Policies must be implemented to dictate how passwords are
constructed and use
• Software Licensing
• Systems owned by the organization that all software used is
appropriately licensed
• Internet Usage
• Use of instant messaging, e-mails, file transfers, or other
transactions
LOGGING
• Gives history of the activities that have taken place in the
environment being logged.
• Logging mechanisms can be setup to log anything from
solely critical events to every action carried out by the
system or software such as :
• Software error logs
• Hardware failures
• Users logging in and out
• Resource access
• Tasks requiring increased privileges in most logs
LOGGING
• Available to administrators for review and are usually not
modifiable by the users of the system.
• Logs must be regularly reviewed in order to catch
anything unusual in their contents.
• Logs may be asked to be analyze in relation to a
particular incident or situation
MONITORING
• Subset of auditing and tends to focus on observing about
the environment being monitored in order to discover
undesirable conditions such as failures, resource
shortages, security issues, and trends that might signal
the arrival of such conditions.
MONITORING
• Typically watching specific items of data collected such
as :
• Resource usage on computers
• Network latency
• Attacks occurring repeatedly against servers with network
interfaces exposed to the Internet
• Traffic passing through physical access controls at unusual times
of day
• CLIPPING LEVEL – activities are occurring levels above
what is normally expected
ASSESSMENTS
• A more active route of determining whether everything is
as it should be and compliant with relevant laws,
regulations, policies by examining the environment for
vulnerabilities.
• APPROACHES
• Vulnerability Assessment
• Penetration Testing
VULNERABILITY ASSESSMENT
• Involves use of vulnerability scanning tools in order to
locate a vulnerability.
• NESSUS
• Vulnerability scanning tool checking target systems to discover
which ports are open and then interrogating each open port to find
out exactly which service is listening on the port in question.
• With the information collected, it checks its database of
vulnerability information to determine whether any vulnerability
may be presernt.
PENETRATION TESTING
• Mimicking the techniques an actual attacker may use to
penetrate a system.

Data security auditing and accountability

  • 1.
  • 2.
    THE NEED FORACCOUNTABILITY Even though we allowed a party to access a resource, we need to ensure that they behave in accordance with rules set.
  • 3.
  • 4.
    ACCOUNTABILITY • Provides themeans to trace activities in our environment back to their source. • Depends on identification, authentication, and access control being present so that one can know who a given transaction is associated with and what permissions were used to allow them to carry it out. • Providing sufficient controls in place to deter or prevent those that would break the rules and abuse the resources they have access to
  • 5.
    SECURITY BENEFITS OF ACCOUNTABILITY •NONREPUDIATION • Refers to a situation in which sufficient evidence exists to prevent an individual from successfully denying that he or she has made a statement, or taken an action. • Example : system or network logs
  • 6.
    SECURITY BENEFITS OF ACCOUNTABILITY •DETERRENCE • If those monitored are aware that they are monitored and has been communicated to them that there will be penalties for acting against the rules, these individuals may think twice before straying outside the lines.
  • 7.
    SECURITY BENEFITS OF ACCOUNTABILITY •INTRUSION DETECTION AND PREVENTION • example implementation of alerts based on unusual activities in our environment and check information we have logged on a regular basis
  • 8.
    SECURITY BENEFITS OF ACCOUNTABILITY •ADMISSIBILITY OF RECORDS • It is often much easier to prove admissibility when records are produced from a regulated and consistent tracking system. This means the organization can provide a solid and documented chain of custody for said evidence such as showing where evidence was at all times, how exactly it passed from one person to another, how it was protected while it was stored and so on.
  • 9.
    AUDITING • A methodologicalexamination and review of resources • Provides with data which can be implemented for accountability
  • 10.
    WHAT DO WEAUDIT • Password • Policies must be implemented to dictate how passwords are constructed and use • Software Licensing • Systems owned by the organization that all software used is appropriately licensed • Internet Usage • Use of instant messaging, e-mails, file transfers, or other transactions
  • 11.
    LOGGING • Gives historyof the activities that have taken place in the environment being logged. • Logging mechanisms can be setup to log anything from solely critical events to every action carried out by the system or software such as : • Software error logs • Hardware failures • Users logging in and out • Resource access • Tasks requiring increased privileges in most logs
  • 12.
    LOGGING • Available toadministrators for review and are usually not modifiable by the users of the system. • Logs must be regularly reviewed in order to catch anything unusual in their contents. • Logs may be asked to be analyze in relation to a particular incident or situation
  • 13.
    MONITORING • Subset ofauditing and tends to focus on observing about the environment being monitored in order to discover undesirable conditions such as failures, resource shortages, security issues, and trends that might signal the arrival of such conditions.
  • 14.
    MONITORING • Typically watchingspecific items of data collected such as : • Resource usage on computers • Network latency • Attacks occurring repeatedly against servers with network interfaces exposed to the Internet • Traffic passing through physical access controls at unusual times of day • CLIPPING LEVEL – activities are occurring levels above what is normally expected
  • 15.
    ASSESSMENTS • A moreactive route of determining whether everything is as it should be and compliant with relevant laws, regulations, policies by examining the environment for vulnerabilities. • APPROACHES • Vulnerability Assessment • Penetration Testing
  • 16.
    VULNERABILITY ASSESSMENT • Involvesuse of vulnerability scanning tools in order to locate a vulnerability. • NESSUS • Vulnerability scanning tool checking target systems to discover which ports are open and then interrogating each open port to find out exactly which service is listening on the port in question. • With the information collected, it checks its database of vulnerability information to determine whether any vulnerability may be presernt.
  • 17.
    PENETRATION TESTING • Mimickingthe techniques an actual attacker may use to penetrate a system.