HP OpenVMS Guide to System Security |
Security for the System Administrator |
Security Auditing |
|
|
| |
Assessing Your Auditing Requirements ![]()
Assessing your auditing requirements is a two-step process:
After developing a general notion of your site requirements, you need to consider how much security reporting is realistic. Balance the suggestions in Events to Monitor Depending on a Site's Security Requirements with the following site factors:
In Events to Monitor Depending on a Site's Security Requirements, the event classes suggested for a low-security site are the default settings for the operating system. If these classes are not the current defaults on your system, you can enable them with the following command:
In a site with moderate security requirements, you want to audit events that can redefine your system. You watch for changes to system files, system time, or system parameters. You also monitor image installations and the use of privilege. Auditing Events for a Site with Moderate Security Requirements shows the auditing setting for a site with moderate security requirements.$SET AUDIT/ALARM/AUDIT - _$ /ENABLE=(ACL,AUTHORIZATION,BREAKIN:ALL,LOGFAILURE:ALL)
To enable the settings for a moderate level of auditing, assuming the default events are already in effect, enter the following set of commands:
A site with high security requirements expands its auditing breadth to include network activity. It needs to monitor changes to the network database, network connections (VAX only), the use of identifiers as privileges, and privileged file access. Monitor all file access through SYSPRV, BYPASS, or READALL privilege, and watch both successful and unsuccessful file access through GRPPRV privilege. To enable the settings for a high level of auditing, assuming a medium level is in effect, enter the following set of commands:$SET AUDIT/ALARM/AUDIT/ENABLE=PRIVILEGE=(SUCCESS:SECURITY,FAILURE:SECURITY)$SET AUDIT/AUDIT/ENABLE=(INSTALL,SYSGEN,TIME,PRIVILEGE=(SUCCESS,FAILURE))$SET AUDIT/AUDIT/ENABLE=ACCESS=(BYPASS,SYSPRV,READALL)/CLASS=FILE$SET AUDIT/AUDIT/ENABLE=ACCESS=FAILURE/CLASS=(FILE,DEVICE,VOLUME)
To enable all auditing:$SET AUDIT/ALARM/ENABLE=(INSTALL,SYSGEN,TIME,PRIVILEGE=(FAILURE:ALL) )$SET AUDIT/AUDIT/ENABLE=(CONNECTION,IDENTIFIER,NCP,PROCESS:ALL)$SET AUDIT/AUDIT/ENABLE=ACCESS=FAILURE/CLASS=*
To disable all auditing:$SET AUDIT/AUDIT/ENABLE=ALL/CLASS=*
See Security Auditing for more suggestions of event classes to enable.$SET AUDIT/AUDIT/DISABLE=ALL/CLASS=*
Selecting a Destination for the Event Message ![]()
The operating system can report a security event as either
an alarm or an audit (see
Auditing Categories of Activity). Which form you select depends on the nature
of the event. Real-time events or events that should be treated
immediately, such as break-in attempts or changes to the system
user authorization file (SYSUAF.DAT), are classes to enable as both
alarms and audits. Less critical events can be enabled just as audits.
Unless you have a hardcopy operator terminal, the alarm record is
quickly superseded by other system messages. Audit event records,
which are written to the system security audit log, are saved so
you can study them in volume.
There is an advantage to studying event messages. Many times an isolated auditing message offers little insight, but numerous audit records reveal a pattern of activity that might indicate security violations. With auditing of object access, for example, a security administrator can see a pattern of time, types of objects being accessed, and other system information that, in total, paint a complete picture of system activity. Analyzing a Log File describes how to produce reports from audit log files.
Considering the Performance Impact ![]()
The default auditing performed by the operating system primarily
tracks changes to the authorization databases. System events like
changes to the system user authorization file (SYSUAF.DAT) or the installation
of images do not occur too often and therefore are not a drain on
system resources.
Auditing additional event classes, particularly access events and privilege events, can consume significant system resources if a site enables the event classes without understanding how their system is used and without evaluating the value of the audit information. In this respect, implementation of the audit reporting system is similar to system tuning: it takes a little while to reach the appropriate level of reporting that is free of spurious details. For this reason, HP recommends you turn auditing on in phases, not all at once, and gradually add or subtract event classes until you reach a satisfactory balance. Use the following guidelines:
Two commands in particular generate a large number of audit messages:
|
|