Intruders are always looking for new ways to break into networked computer systems. Even if your organisation has implemented comprehensive information security protection measures (such as firewalls), it is essential that you closely monitor your information assets and transactions involving these assets for signs of intrusion.
Monitoring may be complicated because intruders often hide their activities by changing the systems they break into.
A general security goal is to prevent intrusions. However, because no prevention measures are perfect, you also need a strategy for handling intrusions that includes preparation, detection, and response. The following focuses on preparation and detection. The practices recommended below are designed to help you prepare for and detect intrusions by looking for unexpected or suspicious behaviour and "fingerprints" of known intrusion methods.
These practices do not cover
- preventing intrusions
- responding to intrusions. Refer to Responding to Intrusions [Kossakowski 99].
- establishing initial configurations of applications, operating systems,
- networks, or workstations. Refer to Securing Desktop Workstations [Ford 99],
- Securing Network Servers [Allen 00], and Securing Public Web Servers [Kossakowski 00].
- protecting user privacy while in the process of detecting signs of intrusion
- using security monitoring and reporting services provided by outside (third party) organisations
If you do not know that an intrusion or an intrusion attempt has occurred, it is difficult, if not impossible, to later determine if your systems have been compromised. If the information necessary to detect an intrusion is not being collected and reviewed, you cannot determine what sensitive data, systems, and networks are being attacked and what breaches in confidentiality, integrity, or availability have occurred. As a result of an inadequate ability to detect signs of intrusion, the following may occur:
The general approach to detecting intrusions is
- Observe your systems for anything unexpected or suspicious.
- Investigate anything you find to be unusual.
- If your investigation finds something that isn't explained by authorised activity, immediately initiate your intrusion response procedures.
While this process sounds simple enough, implementing it is a resource-intensive activity that requires continuous, automated support and daily administrative effort. Furthermore, the scale of intrusion detection practices may need to change as threats, system configurations, or security requirements change. In all cases, however, there are five areas that must be addressed.
Adequate preparation, which should include
- defining the required policies and procedures necessary to meet your business objectives and prepare your staff and systems to detect signs of intrusion
- integrity of the software you use to detect intrusions
- monitoring the behaviour of your systems and the traffic on your networks
- physical forms of intrusion to your computer systems, off-line data storage media, and output devices
- follow through, including investigation of reports by users and other reliable sources (such as incident response teams) and taking action when unexpected activities occur
As you look for signs of intrusion, keep in mind that information from one source may not appear suspicious by itself. Inconsistencies among several sources can sometimes be the best indication of suspicious behaviour or intrusions.
Summary of recommended practices
- Establish a policy and procedures that prepare your organisation to detect signs of intrusion.
- Identify data that characterise systems and aid in detecting signs of suspicious behaviour.
- Manage logging and other data collection mechanisms. Integrity of intrusion detection software
- Ensure that the software used to examine systems has not been compromised. Behaviour of networks and systems
- Monitor and inspect network activities for unexpected behaviour.
- Monitor and inspect system activities for unexpected behaviour.
- Inspect files and directories for unexpected changes. Physical forms of intrusion
- Investigate unauthorised hardware attached to your organisation's network.
- Inspect physical resources for signs of unauthorised access.
- Review reports by users and external contacts about suspicious and unexpected behaviour.
- Take appropriate actions upon discovering unauthorised, unexpected, or suspicious activity.