From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Conduct log reviews
From the course: Performing a Technical Security Audit and Assessment
Conduct log reviews
- [Instructor] All systems should have audit logs enabled to provide historical records of system activities. The purpose of log reviews is to assess whether systems adequately log crucial security events, and if the organization follows its logging policies and standards. Here's an example log review. Compare the organization's written logging policies and standards with their system audit logs and configuration settings. This comparison will verify whether logging is happening as required. For instance, if an organization requires logging successful and failed authentication attempts but a system logs only successful attempts, this would be noted as a finding by the assessor. Log reviews can reveal system configuration issues or evidence of unauthorized activity. A well-known example of log reviews exposing unauthorized activity is detailed in the book, "Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage" by Cliff Stoll, where systematic log reviews help trace a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Baseline skill sets for security reviews2m 21s
-
(Locked)
Conduct documentation reviews1m 58s
-
(Locked)
Conduct log reviews2m 8s
-
(Locked)
Conduct ruleset reviews2m 18s
-
(Locked)
Conduct system configuration reviews2m 51s
-
(Locked)
Conduct network sniffing1m 19s
-
(Locked)
Network sniffing tool demo: Wireshark2m 16s
-
(Locked)
Conduct file integrity checking2m 39s
-
File integrity checking tool demo1m 21s
-
(Locked)
Challenge: Pick the right reviews1m 6s
-
(Locked)
Solution: Pick the right reviews2m 37s
-
-
-
-
-
-
-