Maintaining a reliable and secure repository of logs is important for many reasons: establishing a foresnic trail of evidence in the case of fraud or attack, and enabling event correlation across many devices, among others. Particularly in regulated industries, management should enact controls that prevent security, application and system logs from being tampered with.
Many organizations choose to consolidate their logs on to a centralized syslog server. Many devices and just about all UNIX-like operating systems (Linux, free/net/open BSD, Solaris, AIX) support syslog natively. Windows-based systems require a tool to convert event logs to syslog.
Syslog is a simple protocol and is easy to wrap some very effective security around. The goal is remove as many opportunities for the central syslog server to be compromised as practical. There are 3 aspects to hardening a syslog server that we’ll cover:
Key processes need to be maintained to ensure the integrity of the log server. We won’t go into detail on how to accomplish these, as any mature IT organization will have functioning version of these processes.
Segregate the syslog server from the rest of the network servers with a firewall. On the firewall, we will want to open just the port needed for syslog logs to flow from clients to the server – generally UDP/514. Opening other ports, such as SSH may be desirable, but will increase the exposure of the server. An alternative approach is to require authentication to the segmenting firewall, which will enable an additional set of ports, such as SSH. We will, of course, want to log the authentication successes and failures. Additionally, we will want to prevent the syslog server from initiating any connections outbound to the Internet.
Firewall rule summary:
What is described here is probably far beyond what most organizations will want to implement to protect their logs. This should serve as a list of “best practices” that can be implemented, depending on the perceived threats in a given organization. Logs are very critical, and serious consideration should be paid to each of the recommendations. The depth of protections that may need to be applied to a logs provides a good example of why a Log Management Service should be considered.