------------------
Blogs
Webcasts
Quickstudies
Security Manager's Journal
This Week in Print
------------------
Zones
White Papers
Buyer's Guide
Editorial Calendar
------------------
Events
Research
E-mail Newsletters
------------------
Industry
- Automotive
- Defense/Aerospace
- Energy/Utilities
- Financial
- Health Care
- Retail
- Transportation
- Travel
- Manufacturing
- Small Enterprise
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Computerworld
40 years of the most authoritative source of news and information for IT leaders.
The Undeniable Business Value of Data Visualization
(Related)
Learn how to achieve, maintain, and demonstrate compliance with PCI requirements
(Related)
Vulnerability Management & Policy Compliance Overview
(Related)
New Computerworld content piece on Rob Ashe, CEO of Cognos
(Related)
Computerworld Survey Results: How Organizations Are Managing Their Firewall Infrastructure
(Related)
Operationalizing Security & Policy Compliance - A Unified Approach for IT, Audit and Operation Teams
(Related)
The Untethered Worker
(Related)
Strategies for Protecting Against Internet Threats
(Related)
A Great Leap Forward in Storage for the SMB
(Related)
Sign up to receive Security Resource Alerts (Related)
July 16, 2007 (Computerworld) (Related) -- With each high-profile data breach (such as those at The TJX Companies (Related) and the U.S. Department of Agriculture (Related) ) or new regulation, security emphasis seems to shift away from the traditional "keep bad guys out" mentality and toward a layered, in-depth, "What's going on in here?" look at IT activity. Organizations are turning to logs to provide a continuous trail of everything that happens with their IT systems and, more importantly, with their data.
Logs of different types are generated from different sources at an astounding rate, allowing for a detailed -- if sometimes cloudy -- picture of IT activity. If a disgruntled employee with an intent to steal data accesses a database containing confidential information, there would likely be a log of that activity that someone could review to determine the who, what and when. Logs provide the bread crumbs that organizations can use to follow the paths of all of their users, bad-intentioned or not.
It follows that managing these logs can benefit an organization in many ways. They offer situational awareness and help organizations pinpoint new threats as well as allow their effective investigation. Routine log reviews and in-depth analysis of stored logs are beneficial for identifying security incidents, policy violations, fraudulent activity and operational problems shortly after they have occurred, as well as for providing information useful for resolving such problems.
Given the inherent benefits of log management, it is not surprising that log data collection and analysis is generally considered a security industry "best practice." However, a number of regulations also explicitly call for the collection, storage, maintenance and review of logs, turning log management from a "should do" to a "must do." Some of these regulations rely on National Institute of Standards and Technology Computer Security Special Publications (NIST SP) to delineate the detailed logging requirements.
In my previous article (Related) , I described the way in which three regulations (FISMA, HIPAA and PCI-DSS) affect incident-response processes. This triumvirate also affects log management, since they call for enabling logging as well as for log review.
The Federal Information Security Management Act of 2002 (FISMA)
While many criticize FISMA for being all documentation and no action, the law simply emphasizes the need for each federal agency to develop, document and implement an organizationwide program to secure the information systems that support its operations and assets. NIST SP 800-53, Recommended Security Controls for Federal Information Systems , describes log management controls including the generation, review, protection and retention of audit records, plus steps to take in the event of audit failure.
Print this Story (Related) Send Us Feedback (Related) E-mail this Story (Related)
Digg this Story
(Related)
Slashdot this Story (Related) Restaurant Chain Beefs Up Payment Card Protections (Related) IBM pushes 32-nanometer chips with BASF deal (Related) Boardroom Video: Being More Competitive (Related)
"
What, me worry? It's Wednesday's IT Blogwatch: in which Microsoft encounters trouble getting Office Open XML ratified as a..."
Read more... (Related)
"
According to a report by the Veterans Affair Department, an employee of the organization attempted to Read more... (Related) Read more Government/Regulations posts (Related) or See all Blogs (Related)
DBAs reveal how they rev their database without spending a fortune
(Related)
Pfizer waited six weeks to disclose breach that exposed data on thousands
(Related)
Mac Attack! An enterprise PC shop switches to Apple
(Related) More top stories... (Related)
Hacking extortionist resurfaces
(Related)
Mac OS X worm maker raps Apple on security
(Related)
Microsoft declares serious intentions for casual games
(Related)
Where can you earn top dollar, get the best benefits, the latest IT and
more? Find out in our 14th annual survey of the Best Places to Work in IT.
Does the must-have phone of '07 live up to its hype? Absolutely -- it's
worth the high price and delivers tomorrow's technology today, says
reviewer Mike DeAgonia.
Check out some of the most entertaining advertisements that have appeared
in Computerworld since 1967.
What do you get when you take an already fine laptop and give it a faster
processor, faster front-side bus, a better video card and a 7,200-rpm hard
drive? Laptop nirvana.
Reviews, analyses, how-tos, visual tours, hot issues and predictions about Microsoft's new OS.
Four years from now, the IT field will be a vastly different place. Will you be ready?
Customer Experience Management Zone (Related)
Integrity Zone (Related)
The Mobility Zone (Related)
Performance Management Zone (Related)
Server Management Zone (Related)
The SAS Zone (Related)
Software Zone (Related)
The Vulnerability Management & Policy Compliance Zone (Related)
The Web Conferencing Zone (Related)
See your link here (Related)
(Source: Computerworld)
It is through the Web that the most potentially harmful and malicious threats can enter a computer system. Yet, nearly half of all organizations in the U.S. continue to do nothing about Web Filtering or blocking.
Learn about the effective and affordable strategies that your organization can use to protect itself from internet threats in the new report from Computerworld. For a limited time this report is being made available at no cost to our customers, compliments of St. Bernard Software.
(VeriSign) These days, people conduct business from virtually anywhere, thanks to continual advances in Internet technology. As enterprises begin to accommodate the demands of this "Any Era," threats to your infrastructure inevitably increase. VeriSign has created a Layered Security solution to provide added security without sacrificing a rich user experience.
Download this white paper (Related) Download this white paper
Download this on demand webcast now!
Go to the webcast (Related) Go to the webcast
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
Operationalizing Security & Policy Compliance - A Unified Approach for IT, Audit and Operation Teams (Related) Computerworld Survey Results: How Organizations Are Managing Their Firewall Infrastructure (Related) New Computerworld content piece on Rob Ashe, CEO of Cognos (Related) View more whitepapers (Related) View more whitepapers
Users hope storage consolidation will lower TCO. Read more ... (Related) See more Storage news (Related) See more Storage news
Learn how Ingres and GoldenGate Software together offer a unique solution that addresses the issue of increased data and increased users trying to access that data, potentially saving millions of dollars for the CIO. Download this on demand webcast.
Register now! (Related)
Microsoft System Center - Enterprise-class reliability, scalability, and security.
(Related) Microsoft System Center - Enterprise-class reliability, scalability, and security.
Computerworld Survey Results: How Organizations Are Managing Their Firewall Infrastructure
(Related) Computerworld Survey Results: How Organizations Are Managing Their Firewall Infrastructure
White Paper: Siemens IT Solutions and Services Success Story
(Related) White Paper: Siemens IT Solutions and Services Success Story
White Paper: Success Apparel Success Story
(Related) White Paper: Success Apparel Success Story
Cafe Belmondo Coffee, Try our Premium Gourmet Coffee for only $10 and receive a free gift.
(Related) Cafe Belmondo Coffee, Try our Premium Gourmet Coffee for only $10 and receive a free gift.
Thompson Cigars: Treat yourself to one of the finest selections of hand rolled cigars available
(Related) Thompson Cigars: Treat yourself to one of the finest selections of hand rolled cigars available
Get Microsoft & Novell INTEROP ABILITY.
(Related) Get Microsoft & Novell INTEROP ABILITY.
Attend Nortel's Unified Communications Webinar Series
(Related) Attend Nortel's Unified Communications Webinar Series
Lower power consumption, better space utilization-HP's newest blade technology
(Related) Lower power consumption, better space utilization-HP's newest blade technology
The HP StorageWorks Ultrium 448c Tape Blade-made for BladeSystem c-Class enclosures
(Related) The HP StorageWorks Ultrium 448c Tape Blade-made for BladeSystem c-Class enclosures
"Building a Virtual Infrastructure from Server to Storage"
(Related) "Building a Virtual Infrastructure from Server to Storage"
Manage your time, power and resources with the HP BladeSystem
(Related) Manage your time, power and resources with the HP BladeSystem
White Paper - Acceleration: Bottlenecks, pitfalls and tips
(Related) White Paper - Acceleration: Bottlenecks, pitfalls and tips
For a limited time, reduced price on Crystal Reports® XI, New or Upgrade.
(Related) For a limited time, reduced price on Crystal Reports® XI, New or Upgrade.
How to Protect Your Company From the Growing Threats of Russian Hackers
(Related) How to Protect Your Company From the Growing Threats of Russian Hackers
Ten Steps to Mobile Security
(Related) Ten Steps to Mobile Security
Technology Briefing - A Great Leap Forward in Storage for the SMB
(Related) Technology Briefing - A Great Leap Forward in Storage for the SMB
Webcast - Simplifying the storage environments for small and mid-sized businesses
(Related) Webcast - Simplifying the storage environments for small and mid-sized businesses
Get security insights from CIO Magazine and Trend Micro at the 2007 Virtual Security Summit.
(Related) Get security insights from CIO Magazine and Trend Micro at the 2007 Virtual Security Summit.
Protecting Your Enterprise: Now and Into the Future
(Related) Protecting Your Enterprise: Now and Into the Future
Endpoint Security Virtual Conference: Protecting data at the edge of your network. Register now!
(Related) Endpoint Security Virtual Conference: Protecting data at the edge of your network. Register now!
Learn about the latest encryption and authentication technologies that will help to protect your organization!
(Related) Learn about the latest encryption and authentication technologies that will help to protect your organization!
Computerworld Report - Enterprises Rate Importance of IP Telephony Features, Management, and Applications
(Related) Computerworld Report - Enterprises Rate Importance of IP Telephony Features, Management, and Applications
Does Your Antivirus Software Detect Spyware? Test drive CounterSpy Enterprise!
(Related) Does Your Antivirus Software Detect Spyware? Test drive CounterSpy Enterprise!
Learn from Success: Integrating Legacy with SOA for Faster Business Processes
(Related) Learn from Success: Integrating Legacy with SOA for Faster Business Processes
Upgrade to Next-Generation Antispam/Antivirus for Exchange: Download Messaging Ninja Today!
(Related) Upgrade to Next-Generation Antispam/Antivirus for Exchange: Download Messaging Ninja Today!
"The Definitive Guide to Security Management" Chapter 1: Introduction to Security Management
(Related) "The Definitive Guide to Security Management" Chapter 1: Introduction to Security Management
Easy and affordable PC Disk and File Encryption for Enterprises from the company that protects YOUR Government - Free 30 day evaluation
(Related) Easy and affordable PC Disk and File Encryption for Enterprises from the company that protects YOUR Government - Free 30 day evaluation
Migrating from ERwin®toPowerDesigner® by Sybase
(Related) Migrating from ERwin®toPowerDesigner® by Sybase
"The Definitive Guide to Security Management" Chapter 1: Introduction to Security Management
(Related) "The Definitive Guide to Security Management" Chapter 1: Introduction to Security Management
Introducing: Project Icebreaker
(Related) Introducing: Project Icebreaker
JavaWorld (Related) LinuxWorld (Related) MacUser (Related) Macworld (Related) Network World (Related) PC World (Related) Playlist (Related)
Copyright © 2007 Computerworld Inc. All
rights reserved. Reproduction in whole or in part in any form or medium
without express written permission of Computerworld Inc. is prohibited.
Computerworld and Computerworld.com and the respective logos are
trademarks of International Data Group Inc.
No comments:
Post a Comment