Policy 7230A - Department of Administration

Policy 7230A - Department of Administration Policy 7230A - Department of Administration

10.10.2014 Views

and systems should be afforded appropriate protection based on this risk classification. 7.1.1.c Log Failure • If system logging fails because on-line storage is filled, the system should issue an alert to appropriate administrative staff and begin overwriting logs, starting with the oldest online log information. • If system logging fails for any other reason, the information system should issue an alert to appropriate administrative staff but take no other actions. 7.1.2. Test Auditing Capabilities Agencies should periodic audit capability testing to ensure that auditing capabilities continue to operate as intended: 7.1.2.a Audit Testing Methodologies • On-line log storage should be artificially filled to just below capacity and the system allowed to process activity until capacity is reached to observe whether an automatic transfer to off-line storage occurs and whether automatic log overwrite begins. • Log functionality should be artificially halted and the system allowed to continue operations to observe whether processing continues or is halted. 7.1.2.b Audit Testing Scheduling and Frequency • Audit testing should be performed on an at least annual basis. 7.1.3. Operate Auditing Capabilities Agencies should analyze the information generated by these auditing capabilities on an ongoing basis to ensure systems are being operated in the appropriate manner and that security is being maintained: 7.1.3.a Log Review Scheduling and Frequency • Where sufficient resources exist, all logs generated for all information systems should be reviewed daily. • Where sufficient resources for full log review do not exist partial random log review should be performed: o A randomly determined subset of all systems should be reviewed. o A randomly determined subset of all log entries should be reviewed. o Random review should be structured such that either every system or every log entry type should be 22

eviewed weekly and every system and every log entry type should be reviewed biweekly. 7.1.3.b Log Prioritization Scheme • Events that affect systems and/or information of greater criticality and/or sensitivity should receive a higher prioritization. • Events that occur with greater frequency should receive a higher prioritization. • Events that can be correlated across multiple systems should receive a higher prioritization. • Other factors can be included in the prioritization process: o Time of day of the event. o Day of the week and/or month of the event. o Source of the event. o Newness of the event. 7.1.3.c Log Response • Where systems are determined to be out of synchronization with established standards, system documentation should be checked to determine if the variance is documented and approved. If not, the system owner is to be contacted and the system should be restored to established standards. • Where security attacks are determined to have occurred the event should be considered a Security Incident and Incident Response processes should be initiated. • Where policy violations are determined to have occurred, depending on the nature of the violations, various actions may be taken: o Policy violation sanctions may be taken. o Incident Response processes may be triggered. 7.2. Maintain Records Agencies should capture documentation appropriate to all systems audit processes: • Document and retain copies of the configuration of logging capabilities for each system. • Document and retain copies of the results of all tests of system logging capabilities. • Maintain copies of all reports generated as a result of log monitoring and analysis. 23

and systems should be afforded appropriate protection based<br />

on this risk classification.<br />

7.1.1.c Log Failure<br />

• If system logging fails because on-line storage is filled, the<br />

system should issue an alert to appropriate administrative<br />

staff and begin overwriting logs, starting with the oldest online<br />

log information.<br />

• If system logging fails for any other reason, the information<br />

system should issue an alert to appropriate administrative<br />

staff but take no other actions.<br />

7.1.2. Test Auditing Capabilities<br />

Agencies should periodic audit capability testing to ensure that auditing<br />

capabilities continue to operate as intended:<br />

7.1.2.a Audit Testing Methodologies<br />

• On-line log storage should be artificially filled to just below<br />

capacity and the system allowed to process activity until<br />

capacity is reached to observe whether an automatic transfer<br />

to <strong>of</strong>f-line storage occurs and whether automatic log overwrite<br />

begins.<br />

• Log functionality should be artificially halted and the system<br />

allowed to continue operations to observe whether processing<br />

continues or is halted.<br />

7.1.2.b Audit Testing Scheduling and Frequency<br />

• Audit testing should be performed on an at least annual basis.<br />

7.1.3. Operate Auditing Capabilities<br />

Agencies should analyze the information generated by these auditing<br />

capabilities on an ongoing basis to ensure systems are being operated in the<br />

appropriate manner and that security is being maintained:<br />

7.1.3.a Log Review Scheduling and Frequency<br />

• Where sufficient resources exist, all logs generated for all<br />

information systems should be reviewed daily.<br />

• Where sufficient resources for full log review do not exist<br />

partial random log review should be performed:<br />

o A randomly determined subset <strong>of</strong> all systems should be<br />

reviewed.<br />

o A randomly determined subset <strong>of</strong> all log entries should<br />

be reviewed.<br />

o Random review should be structured such that either<br />

every system or every log entry type should be<br />

22

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!