<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Centralized extendable secure logging application? in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164557#M738873</link>
    <description>We've got logs everywhere of all kinds of things, the more merrier I always say.  It really gets unwieldly to manage them, keep them secure, know who's reading them, recording access activity, and differentiating that from the recording of the new data itself, etc.&lt;BR /&gt;&lt;BR /&gt;Requirements now state that I need a log of who accesses audit logs, who changes audit logs, who initializes audit logs, etc.  Rather than writing such for each and every type of log for each and every type of area (system, network, database) - which is what we've got now, with SOME centralization, I'd like an extensible, centralized, secure, auditable piece of software that I can send data to, that organizes collected data by type and subtype, provides time stamping, CRC certification, update protection, as well as purging and archiving, and review.&lt;BR /&gt;&lt;BR /&gt;Whew, I *know* that's asking a lot - but SURELY someone has done this, or most of this already.&lt;BR /&gt;&lt;BR /&gt;Suggestions for all or part of solution, as well as commercial and open source are appreciated.  &lt;BR /&gt;&lt;BR /&gt;Thanks!&lt;BR /&gt;&lt;BR /&gt;P.S. Plz don't just suggest a syslog server, I've got that already, and it misses way too many of the requirements.</description>
    <pubDate>Wed, 19 Mar 2008 14:24:46 GMT</pubDate>
    <dc:creator>TwoProc</dc:creator>
    <dc:date>2008-03-19T14:24:46Z</dc:date>
    <item>
      <title>Centralized extendable secure logging application?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164557#M738873</link>
      <description>We've got logs everywhere of all kinds of things, the more merrier I always say.  It really gets unwieldly to manage them, keep them secure, know who's reading them, recording access activity, and differentiating that from the recording of the new data itself, etc.&lt;BR /&gt;&lt;BR /&gt;Requirements now state that I need a log of who accesses audit logs, who changes audit logs, who initializes audit logs, etc.  Rather than writing such for each and every type of log for each and every type of area (system, network, database) - which is what we've got now, with SOME centralization, I'd like an extensible, centralized, secure, auditable piece of software that I can send data to, that organizes collected data by type and subtype, provides time stamping, CRC certification, update protection, as well as purging and archiving, and review.&lt;BR /&gt;&lt;BR /&gt;Whew, I *know* that's asking a lot - but SURELY someone has done this, or most of this already.&lt;BR /&gt;&lt;BR /&gt;Suggestions for all or part of solution, as well as commercial and open source are appreciated.  &lt;BR /&gt;&lt;BR /&gt;Thanks!&lt;BR /&gt;&lt;BR /&gt;P.S. Plz don't just suggest a syslog server, I've got that already, and it misses way too many of the requirements.</description>
      <pubDate>Wed, 19 Mar 2008 14:24:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164557#M738873</guid>
      <dc:creator>TwoProc</dc:creator>
      <dc:date>2008-03-19T14:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: Centralized extendable secure logging application?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164558#M738874</link>
      <description>We have that same scenario.  But we use syslog services to a specific syslog server that we lock down access to bigtime.  We run just the minimum services on that server and only allow just those that need access to their logs.  Then we have a bunch of scripts that moves the files to the appropriate locations on the server so we can lock down those filesystem to only those who need to read them.   We also have a read-only type device on the server to write logs for the critical apps where we absolutely have to have a "legal" copy of them.  We also write cron jobs to handle the archive, compression, rotation of each apps log files.   Sometimes it can be tricky separating the apps as they come into syslog, but we've been able to work that out with the delegating the types to certain apps and using script to cut things out into their own logs once on the syslog server.  There might be something better out there but we didn't see anything that met our needs so we used syslog and tweaked it.</description>
      <pubDate>Wed, 19 Mar 2008 15:36:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164558#M738874</guid>
      <dc:creator>Bernie Vande Griend</dc:creator>
      <dc:date>2008-03-19T15:36:58Z</dc:date>
    </item>
    <item>
      <title>Re: Centralized extendable secure logging application?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164559#M738875</link>
      <description>There's a whole class of software that was initially designed to be a security tool, but has changed rolls with the advent of HIPAA and SOX - security event management tools (SEMs).  Most of them, like RSA Envision or Intellitactics NSM, include log retention functionality, including log encryption, hashing to prove that the log data was untampered, separating by OS and IP, backup and archiving, ability to look at past logs, etc.  They will also allow sending of email alerts/snmp traps etc in the event something is seen in the logs and the creation of custom reports on the log data. HOWEVER&lt;BR /&gt;*most SEMs' parsing is still weak since the parsing wasn't developed by admins who know an os/app well but by developers on limited data&lt;BR /&gt;*EXPEN$IVE (6 figures minimum and can run over a mil for a large enterprise&lt;BR /&gt;*requires a whole new set of indepth training to use&lt;BR /&gt;*usually wont work in a DHCP environment&lt;BR /&gt;*may require a substantial extra charge to have a vendor engineer come onsite to assist with log collection (especially with apps)&lt;BR /&gt;&lt;BR /&gt;depending on your needs, this might be overkill (especially if you don't need the alerting functionality). you didn't want me to suggest a syslog server, but a syslog server running a slightly better syslog application than native syslogd, such as syslog-ng, coupled with a LOT of scripting might be cheaper and can be tailored to your environment quicker.&lt;BR /&gt;&lt;BR /&gt;If you're interested in SEMs, you might want to attend the RSA conference coming up real soon and get product demos and speak with a lot of the vendors.  But be prepared for sticker shock!</description>
      <pubDate>Wed, 19 Mar 2008 16:37:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164559#M738875</guid>
      <dc:creator>Ian Kidd_1</dc:creator>
      <dc:date>2008-03-19T16:37:46Z</dc:date>
    </item>
    <item>
      <title>Re: Centralized extendable secure logging application?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164560#M738876</link>
      <description>Sounds like the real solution here is to write a nice one myself, and go to the show and sell it for big $$$ and let others have the sticker shock!  :-)&lt;BR /&gt;&lt;BR /&gt;Of course, we won't tell anyone that it would be written in MS Access... :-)</description>
      <pubDate>Wed, 19 Mar 2008 19:34:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164560#M738876</guid>
      <dc:creator>TwoProc</dc:creator>
      <dc:date>2008-03-19T19:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: Centralized extendable secure logging application?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164561#M738877</link>
      <description>Wow, so everyone going through compliance is hacking up their own?&lt;BR /&gt;&lt;BR /&gt;Sigh...&lt;BR /&gt;&lt;BR /&gt;OK, how did you accomplish the requirement that all changes (as in edits) to the audit log be visible, yet not show up on reports when the file just grows?&lt;BR /&gt;&lt;BR /&gt;Tripwire?  Can you specify in it that it should alert for changes, but not for file size growth?&lt;BR /&gt;&lt;BR /&gt;I'm losing my little mind over the requirements for review and security of the audit logs themselves.&lt;BR /&gt;&lt;BR /&gt;I've tried just drinking lots of beer, and while fun and all, it's just not working - at least for compliance.</description>
      <pubDate>Wed, 19 Mar 2008 19:41:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164561#M738877</guid>
      <dc:creator>TwoProc</dc:creator>
      <dc:date>2008-03-19T19:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: Centralized extendable secure logging application?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164562#M738878</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;a) As part of SOX compliance, I worked on&lt;BR /&gt;project to introduce Symantec Enterprise&lt;BR /&gt;Security Manager for several fortune 500 companies.&lt;BR /&gt;&lt;BR /&gt;I do not work for Symantec but it seems the&lt;BR /&gt;customers are quite happy with the solution:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.symantec.com/business/products/overview.jsp?pcid=2242&amp;amp;pvid=855_1" target="_blank"&gt;http://www.symantec.com/business/products/overview.jsp?pcid=2242&amp;amp;pvid=855_1&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Albeit, these solutions are not cheap!&lt;BR /&gt;&lt;BR /&gt;b) SOX is quite vague and therefore,&lt;BR /&gt;solutions to met its requirements can do&lt;BR /&gt;(or not do) many things.&lt;BR /&gt;&lt;BR /&gt;That is typical for any legal document :)&lt;BR /&gt;Their Fog Index is high on purpose so that&lt;BR /&gt;everyone else gets puzzled when trying to&lt;BR /&gt;interpret the results.&lt;BR /&gt;&lt;BR /&gt;c) I heard about several companies who could&lt;BR /&gt;not afford high cost of vendor-based&lt;BR /&gt;solutions and ended up writing home-grown&lt;BR /&gt;scripts and tools.&lt;BR /&gt;&lt;BR /&gt;d) From my colleagues, I hear Tripwire is&lt;BR /&gt;very good too.&lt;BR /&gt;&lt;BR /&gt;e) I have also heard of these solutions:&lt;BR /&gt;&lt;BR /&gt;Enterprise Configuration Manager (ECM):&lt;BR /&gt;&lt;A href="http://www.configuresoft.com/ecm.aspx" target="_blank"&gt;http://www.configuresoft.com/ecm.aspx&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;MasterControl SOX:&lt;BR /&gt;&lt;A href="http://www.mastercontrol.com/solutions/sox_fb.html" target="_blank"&gt;http://www.mastercontrol.com/solutions/sox_fb.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Openpages SOX Express:&lt;BR /&gt;&lt;A href="http://www.openpages.com/" target="_blank"&gt;http://www.openpages.com/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;SOXLab:&lt;BR /&gt;&lt;A href="http://www.soxlab.com/" target="_blank"&gt;http://www.soxlab.com/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;... and there are many others...&lt;BR /&gt;&lt;BR /&gt;Of course, everyone has a different opinion :)&lt;BR /&gt;&lt;BR /&gt;An interesting read:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.controlcase.com/Downloads/Why_SOX_Tools_Fail.pdf" target="_blank"&gt;http://www.controlcase.com/Downloads/Why_SOX_Tools_Fail.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Cheers and good luck,&lt;BR /&gt;&lt;BR /&gt;VK2COT</description>
      <pubDate>Wed, 19 Mar 2008 21:51:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164562#M738878</guid>
      <dc:creator>VK2COT</dc:creator>
      <dc:date>2008-03-19T21:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: Centralized extendable secure logging application?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164563#M738879</link>
      <description>&lt;A href="http://www.loglogic.com" target="_blank"&gt;www.loglogic.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I haven't bought one of these yet, but it's a linux 'appliance' that apparently builds (including racking and getting it online and logging) in under an hour.&lt;BR /&gt;&lt;BR /&gt;I saw a pretty good webinar on it a couple of years ago hosted through &lt;A href="http://www.sans.org" target="_blank"&gt;www.sans.org&lt;/A&gt; (what works in log management). I've read numerous whitepapers since and it's quite good.&lt;BR /&gt;&lt;BR /&gt;It also grabs windows event logs and converts them to syslog form using snare (&lt;A href="http://www.snare.org)," target="_blank"&gt;www.snare.org),&lt;/A&gt; which has agents for almost any other OS and you could hack yourself, but the Log Logic tool is probably cheaper considering the time you'd spend to build a system.&lt;BR /&gt;&lt;BR /&gt;I believe I've also seen a Snare VMWare appliance (on &lt;A href="http://www.vmware.com," target="_blank"&gt;www.vmware.com,&lt;/A&gt; which is now EMC).&lt;BR /&gt;&lt;BR /&gt;The log logic one also covers compliance. Your biggest problem will be sizing to ensure you are getting all the messages if there is an issue, network bursting gets too high and you lost packets, since they're all UDP, you won't know what you've lost.</description>
      <pubDate>Mon, 31 Mar 2008 17:37:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/centralized-extendable-secure-logging-application/m-p/4164563#M738879</guid>
      <dc:creator>Don Mallory</dc:creator>
      <dc:date>2008-03-31T17:37:32Z</dc:date>
    </item>
  </channel>
</rss>

