SlideShare ist ein Scribd-Unternehmen logo
1 von 50
Downloaden Sie, um offline zu lesen
1
UniVerse 11.2 Audit Logging
Ben Peach, Technical Support Engineer
2
Credits and Acknowledgements
Presenter
• Ben Peach, Technical Support Engineer
Developer
• Jing Cui, CISSP, Lead Development Engineer
Support Subject Matter Experts
• Liam Collier, Technical Support Engineer (US)
Š2015 Rocket Software, Inc. All Rights Reserved.
3
Abstract
 U2 Database Audit Logging is a security feature that allows the capture of
any event that occurs in the database. This session introduces Audit and
details the architecture and components. It also includes some
recommendations for best practices.
Š2015 Rocket Software, Inc. All Rights Reserved.
4
Agenda
Overview
Compliance regulations
Architecture
Administration
Components
Best practices
Š2015 Rocket Software, Inc. All Rights Reserved.
5
Version specific
THIS CONTENT IS SPECIFICALLY DIRECTED TO
UNIVERSE 11.2.
This feature changes at 11.3
Š2015 Rocket Software, Inc. All Rights Reserved.
6
Overview
What is Audit?
• Ability to capture database events
What does it capture?
• Who – User, Group
• What – Program, Executable
• Where – Account, File
• When – Time, Date
Š2015 Rocket Software, Inc. All Rights Reserved.
7
Compliance Regulations
PCI DSS
HIPAA and HITECH
GLBA/FFIEC
FISMA
Other regulations
Can Audit help me adhere to security regulations? Yes!
Š2015 Rocket Software, Inc. All Rights Reserved.
8
MV Security Model
U2 Database Audit Logging:
• Part of a much bigger picture.
Š2015 Rocket Software, Inc. All Rights Reserved.
9
Architecture
New audman utility
• OS level
• Used to configure and maintain
Install, enable, and disable
Audit configuration file
Audit log files
Audit staging file
Š2015 Rocket Software, Inc. All Rights Reserved.
10
Install, Enable, and Disable
 Introduced at UniVerse 11.2.0
 Charged on a per-server basis
 No separate installation, just authorization
 Added to license
• 12345678-UV
• 12345678-AUDIT
 Add the package and authorize UniVerse
• uvregen –p AUDIT:1
• Authorize 12345678-UV, not -AUDIT
Š2015 Rocket Software, Inc. All Rights Reserved.
11
Audit Configuration File
Used to define what is logged
Housed in UniVerse home
• $UVHOME/u2audit.config
• %UVHOME%u2audit.config
Encrypted and encoded
• Text file containing cipher text
Configurable via XAdmin or audman
• Not directly editable
Š2015 Rocket Software, Inc. All Rights Reserved.
12
Audit Configuration File
Backed up automatically on change
• $UVHOME/audit/config/u2audit.config.date.time
• %UVHOME%auditconfigu2audit.config.date.time
Loaded at startup
• Errors logged in uvsmm.log and uvsmm.errlog
• All events are logged if unable to load configuration
• Can be reloaded without restarting UniVerse
Default configuration file supplied at install
• u2audit.config.default
• A template/example file
Š2015 Rocket Software, Inc. All Rights Reserved.
13
Audit Log Files
64-bit dynamic hashed file
• Modulo 5000
• Block size 4096
Only 1 log file by default
• AUDIT_LOG_MAX=1
• Must be between 1 and 8
Stored in UniVerse Home directory
• $UVHOME/audit/u2audlogn (n = number of log file)
• %UVHOME%auditu2audlogn (n = number of log file)
• AUDIT_LOG_LOC=/disk1/uv/audit
Š2015 Rocket Software, Inc. All Rights Reserved.
14
Audit Log Files
Log file named u2audlogn
• Where n is the log number (between 1 and 8)
• &AUDLOGn& in VOC
Files can be automatically encrypted
• AUDIT_LOG_ENC=0 (Off, default)
• AUDIT_LOG_ENC=1 (On)
• When turning encryption on archive and clear all current logs
Each log file has its own dictionary
• Dictionary is reloaded on UniVerse start
• Changes to existing dictionary items lost on UniVerse restart
Š2015 Rocket Software, Inc. All Rights Reserved.
15
Audit Log Files
Log record ID structure
• 17396.15053.27902.8816.1
• date.time.tick.pid.sequence
• Date – Internal system date
• Time – Internal system time
• Tick – Number of microseconds since this second started
• PID – Process ID
• Sequence – Sequential number to add total uniqueness
Š2015 Rocket Software, Inc. All Rights Reserved.
16
Audit Log Files
Log record contents
• Event type/class – SYS, DAT, USR
• Origin – Where did the event originate? (uvsh for example)
• Program – The U2 Basic program (log_program_path/stack)
• User, account, file, record ID
• IP Address – Of the host and/or client, if available
• Action – Event dependent, e.g. CreateKey for ADE key creation
• Status – Exist status of the action itself
• Details – Free-form description, varies greatly by event
• Before Action – 0=after, 1=before
• Consolidation – Details of which type of consolidation and specifics
Š2015 Rocket Software, Inc. All Rights Reserved.
17
Audit Log Files
Š 2014 Rocket Software, Inc. All Rights Reserved.
18
Audit Staging Files
Non-session processes are unable to write directly to
hashed files
Failed UV process gets logged to staging
Stored in UniVerse Home directory by default
• $UVHOME/audit/staging
• %UVHOME%auditstaging
• Affected by AUDIT_LOG_LOC in uvconfig
Logged events stored temporarily in individual files
File are encrypted and encoded automatically
Š2015 Rocket Software, Inc. All Rights Reserved.
19
Audit Staging Files
Sweep applies events to audit log file and clears
staging file
• uvsmm daemon/service
At UniVerse start, then every 120 seconds
Interval can be changed using audman or XAdmin
 audman –writestagedlog –interval n
• Cannot be set to less than uvsmm interval
• Reset at UniVerse restart
Š2015 Rocket Software, Inc. All Rights Reserved.
20
uv
config control
uv
config control
Architecture
Š 2013 Rocket Software, Inc. All Rights Reserved.
uvsmm
daemon
Shared
memory
audlog1 audlog2 ….8
uv
uvconfig
U2audit
config
staging
UV Daemons
config control
cache
refresh
map
refresh
audman
writestagedlogadmin initiated
audman
admin options
admin user
read staging
and clear
enable
disable
refresh
21
Administration
New utility: audman
• UniVerse bin directory
Extensible Administration Tool (XAdmin)
• GUI
Changing the configuration file
• Defaults: UNIX/Linux – vi, Windows – Notepad.exe
• Can be configured to use different editor
 U2AUDIT_EDITOR environment variable
• audman -config -editor name_of_editor for a “one off” use
Š2015 Rocket Software, Inc. All Rights Reserved.
22
Administration
Administration tasks
• Configure
• Display configuration
• Reload configuration
• Suspend/resume an audit log file
• Clear an audit log file
• Change sweep interval
• Display audit log file status
• Check/verify audit log file
Š2015 Rocket Software, Inc. All Rights Reserved.
23
Components
Classes
• System, Data, User
Resources
• A database entity
Events
• Something that can happen to a resource
Policies
• A rule (or set of rules)
Š2015 Rocket Software, Inc. All Rights Reserved.
24
Classes
System (SYS)
• Pertaining to or performed by a system process or file
 System daemons, system utilities, configuration files, administrative
commands
 uvsmm, uvrw, uvregen, u2audit.config
Data (DAT)
• Pertaining to a data type object
 Hashed files, indexes, schemas, tables, views
User (USR)
• Application dependent, user specified
 Determined by use of AuditLog() in Basic
Š2015 Rocket Software, Inc. All Rights Reserved.
25
Resources
Resources are logical representations of data and
system objects
• A database entity to which you can point
Three resource classes
• System – uvsmm, uvregen, u2audit.config
• Data – file, index, table, schema, view
• User – determined by use of AuditLog() in Basic
Š2015 Rocket Software, Inc. All Rights Reserved.
26
Events
Action taken on a resource
• WRITE to a file
Use of a resource
• Execution of a Basic program
Three event classes
• System - events at the database level
• Data - actions taken on data files, schemas, indexes, etc.
• User - actions taken by or on users and groups
Š2015 Rocket Software, Inc. All Rights Reserved.
27
Policies
Policies are rules defined in the configuration file
Event policy
• Resource/event combination type
• Switch type
Global policy
• Configuration type
• Definition type
Forced policy
Š2015 Rocket Software, Inc. All Rights Reserved.
28
Policy Terms
List
• Composed of objects of the same type
 Events, processes, programs, users, or files
• Separated by a comma (,) or a vertical bar (|)
 salesEvents=DAT.BASIC.READ,DAT.BASIC.WRITE
Operator
• Specifies inclusion or exclusion
• = set, += add, -= remove
 salesEvents+=DAT.BASIC.DELETE
Š2015 Rocket Software, Inc. All Rights Reserved.
29
Global Policies
Configuration type
• on_error – Stop process if audit log fails
• privileged_user_audit – Log all administrative actions
• log_program_path – Include program path in log record
• log_program_stack – Include program stack in log record
Definition type
• Account – Define a shortcut or keyword to an account
• Group – Define a shortcut or keyword to a group or ‘list’
Š2015 Rocket Software, Inc. All Rights Reserved.
30
Global Policy Examples
on_error=on
log_program_path=on
account=hssales:/disk1/uv/HS.SALES
account=salesacct:/disk1/accounts/SALES
account=financeacct:/disk1/accounts/FINANCE
salesEvents=DAT.BASIC.WRITE
salesEvents+=DAT.BASIC.DELETE
financeEvents=DAT.BASIC.*
financeEvents-=DAT.BASIC.READ
Š2015 Rocket Software, Inc. All Rights Reserved.
31
Event Policies
Resource/Event type
• File – A DAT event on a data resource
• User – Events from a specific user or group
• Process – Events created by a process ID
• Executable – Events from specific UniVerse executables
• Program – Events from specific Basic programs
Switch type
• BeforeAction – Create the log before the event occurs
• Status – Log only success, only fail or both
• Consolidation – Group certain events into one log
Š2015 Rocket Software, Inc. All Rights Reserved.
32
Event Policy Examples
salesEvents.file=hssales:CUSTOMER
 Note: Physical file is used, no multiple log records due to VOC pointers
salesEvents.file=salesacct:*
financeEvents.file=financeacct:*
DAT.QUERY.*.file=/disk1/accounts/REPORTS:*
SYS.SESSION.*.user=pparker,bwayne,ckent
DAT.SQL.COMMAND.consolidation=counter:10
DAT.BASIC.READ.consolidation=time:60
DAT.BASIC.*.status=success
DAT.BASIC.WRITE.status=both
Š2015 Rocket Software, Inc. All Rights Reserved.
33
Forced Policies
The following system events are always logged
• SYS.CONFIG.CHANGE
 Changes to Audit configuration
 Plans for more in the future (uvconfig etc.)
• SYS.SECURITY
 SQL GRANT/REVOKE
 Plans for more in the future (Certificates, Security Context)
• SYS.ADE
 Any Automatic Data Encryption action
• SYS.DAEMON
 Events caused by UniVerse daemons/services
 uvsmm, uvcleanupd, uvapi_server, uvchkd, uvrw
These statements represent Rocket Software’s current intentions. Rocket development plans are subject to change or withdrawal without further notice.
Any reliance on these statements is at the relying party’s sole risk and will not create any liability or obligation for Rocket
34
Policy Creation Example
Š2015 Rocket Software, Inc. All Rights Reserved.
35
Policy Creation Example
Š2015 Rocket Software, Inc. All Rights Reserved.
36
Policy Creation Example
Š2015 Rocket Software, Inc. All Rights Reserved.
37
Best Practices
Reporting
Maintenance
What to audit
Log file location
Š2015 Rocket Software, Inc. All Rights Reserved.
38
Reporting
Create a custom audit log dictionary
Customize your dictionary entries for better
presentation
• SORT &AUDLOG1& USING DICT CUST.DICT.AUD PID
USER EVENTNAME IPADDRESS ACTION
• LIST &AUDLOG2& USING DICT CUST.DICT.AUD USER
TIME
Š2015 Rocket Software, Inc. All Rights Reserved.
39
Maintenance
Log files are hashed files like any other
• Poor sizing means poor performance
• FILE.STAT, RESIZE, etc.
• Check regularly with fixtool
Backup!
• Make them part of your regular backup
• Consider publishing with U2 Replication
 CAUTION: Can cause large performance overload
Š2015 Rocket Software, Inc. All Rights Reserved.
40
Maintenance
Š 2013 Rocket Software, Inc. All Rights Reserved.
audlog1 audlog2
write
write
1) Suspend Log 2
audman –suspendlog 2
read
2) Archive, maintenance
Tool of your choice
3) Clear Log 2
audman –clearlog 2
4) Resume Log 2
audman –resumelog 2
Logging continues
uninterrupted!
41
Maintenance
Š 2013 Rocket Software, Inc. All Rights Reserved.
audlog1 audlog2
write
write
1) Suspend Log 1
audman –suspendlog 1
read
2) Archive, maintenance
Tool of your choice
3) Clear Log 1
audman –clearlog 1
4) Resume Log 1
audman –resumelog 1
Records have been archived
using your preferred method
and no downtime at all!
42
Maintenance
Š2015 Rocket Software, Inc. All Rights Reserved.
43
What to Audit
Compliancy regulations
• Does my compliancy regulation force me to audit these
events/resources?
Performance considerations
• Can I live without auditing this event/resource?
Space considerations
• Do I have enough disk to store these log records?
Š2015 Rocket Software, Inc. All Rights Reserved.
44
Log File Location
Bottom line: Find the best I/O
• Files can be very busy
• Use a separate disk if possible
• An SSD is preferred
Š2015 Rocket Software, Inc. All Rights Reserved.
45
Summary
Overview
Compliance regulations
Architecture
Administration
Components
Best practices
Š2015 Rocket Software, Inc. All Rights Reserved.
46
MV Security Model
U2 Database Audit Logging:
• Part of a much bigger picture.
Š2015 Rocket Software, Inc. All Rights Reserved.
47
Additional Resources
 Links
http://www.rocketsoftware.com
http://en.wikipedia.org/wiki/Category:Security_compliance
http://www.rocketsoftware.com/resource/u2-technical-documentation
 Need help?
U2support@rocketsoftware.com
support.rocketsoftware.com
http://www.rocketsoftware.com/rocket-u2-professional-services-request
Š2015 Rocket Software, Inc. All Rights Reserved.
48
Disclaimer
THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.
WHILE EFFORTS WERE MADE TO VERIFY THE COMPLETENESS AND ACCURACY OF THE INFORMATION CONTAINED
IN THIS PRESENTATION, IT IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED.
IN ADDITION, THIS INFORMATION IS BASED ON ROCKET SOFTWARE’S CURRENT PRODUCT PLANS AND STRATEGY,
WHICH ARE SUBJECT TO CHANGE BY ROCKET SOFTWAREWITHOUT NOTICE.
ROCKET SOFTWARE SHALL NOT BE RESPONSIBLE FOR ANY DAMAGES ARISING OUT OF THE USE OF, OR
OTHERWISE RELATED TO, THIS PRESENTATION OR ANY OTHER DOCUMENTATION.
NOTHING CONTAINED IN THIS PRESENTATION IS INTENDED TO, OR SHALL HAVE THE EFFECT OF:
• CREATING ANY WARRANTY OR REPRESENTATION FROM ROCKET SOFTWARE(OR ITS AFFILIATES OR ITS OR
THEIR SUPPLIERS AND/OR LICENSORS); OR
• ALTERING THE TERMS AND CONDITIONS OF THE APPLICABLE LICENSE AGREEMENT GOVERNING THE USE OF
ROCKET SOFTWARE.
Š2015 Rocket Software, Inc. All Rights Reserved.
49
Trademarks and Acknowledgements
The trademarks and service marks identified in the following list are the exclusive properties of Rocket Software,
Inc. and its subsidiaries (collectively, “Rocket Software”). These marks are registered with the U.S. Patent and
Trademark Office, and may be registered or pending registration in other countries. Not all trademarks owned by
Rocket Software are listed. The absence of a mark from this page neither constitutes a waiver of any intellectual
property rights that Rocket Software has established in its marks nor means that Rocket Software is not owner of
any such marks.
Aldon, CorVu, Dynamic Connect, D3, FlashConnect, Pick, mvBase, MvEnterprise, NetCure,
Rocket, SystemBuilder, U2, U2 Web Development Environment, UniData, UniVerse, and
wIntegrate
Other company, product, and service names mentioned herein may be trademarks or service marks of
others.
Š2015 Rocket Software, Inc. All Rights Reserved.
50

Weitere ähnliche Inhalte

Was ist angesagt?

Git Gerrit Mit Teamforge
Git Gerrit Mit TeamforgeGit Gerrit Mit Teamforge
Git Gerrit Mit Teamforge
CollabNet
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
Denis Gundarev
 

Was ist angesagt? (20)

Explore What’s New In UniData 8.1
Explore What’s New In UniData 8.1Explore What’s New In UniData 8.1
Explore What’s New In UniData 8.1
 
D3 Troubleshooting
D3 TroubleshootingD3 Troubleshooting
D3 Troubleshooting
 
Node.js Tools Ecosystem
Node.js Tools EcosystemNode.js Tools Ecosystem
Node.js Tools Ecosystem
 
U2 Replication with EDA for Report Servers
U2 Replication with EDA for Report ServersU2 Replication with EDA for Report Servers
U2 Replication with EDA for Report Servers
 
U2 Replication for HADR
U2 Replication for HADRU2 Replication for HADR
U2 Replication for HADR
 
HADR Best Practices (High Availability Disaster Recovery)
HADR Best Practices (High Availability Disaster Recovery)HADR Best Practices (High Availability Disaster Recovery)
HADR Best Practices (High Availability Disaster Recovery)
 
MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
 
Virtualization Best Practices
Virtualization Best PracticesVirtualization Best Practices
Virtualization Best Practices
 
MultiValue Gets SaaS-y
MultiValue Gets SaaS-yMultiValue Gets SaaS-y
MultiValue Gets SaaS-y
 
eFolder Expert Series Webinar — How to Back Up and Replicate Off-Site Using e...
eFolder Expert Series Webinar — How to Back Up and Replicate Off-Site Using e...eFolder Expert Series Webinar — How to Back Up and Replicate Off-Site Using e...
eFolder Expert Series Webinar — How to Back Up and Replicate Off-Site Using e...
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
 
Git Gerrit Mit Teamforge
Git Gerrit Mit TeamforgeGit Gerrit Mit Teamforge
Git Gerrit Mit Teamforge
 
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...
 
Intrusion Monitoring Standard Content Guide for ESM 6.8c
Intrusion Monitoring Standard Content Guide for ESM 6.8cIntrusion Monitoring Standard Content Guide for ESM 6.8c
Intrusion Monitoring Standard Content Guide for ESM 6.8c
 
How to Upgrade to IBM i 7.2
How to Upgrade to IBM i 7.2 How to Upgrade to IBM i 7.2
How to Upgrade to IBM i 7.2
 
Critical overview of HMC IBM i FSP and firmware
Critical overview of HMC IBM i FSP and firmwareCritical overview of HMC IBM i FSP and firmware
Critical overview of HMC IBM i FSP and firmware
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 2
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 2Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 2
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 2
 
Long Term Support the Eclipse Way
Long Term Support the Eclipse WayLong Term Support the Eclipse Way
Long Term Support the Eclipse Way
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
 
What you-need-to-know-to-do successful-upgrades
What you-need-to-know-to-do successful-upgradesWhat you-need-to-know-to-do successful-upgrades
What you-need-to-know-to-do successful-upgrades
 

Ähnlich wie UniVerse11.2 Audit Logging

Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
gameaxt
 
Application hardening
Application hardeningApplication hardening
Application hardening
Jayesh Naik
 
WebSphere 6.1 admin Course 3
WebSphere 6.1 admin Course 3WebSphere 6.1 admin Course 3
WebSphere 6.1 admin Course 3
odedns
 

Ähnlich wie UniVerse11.2 Audit Logging (20)

9780840024220 ppt ch10
9780840024220 ppt ch109780840024220 ppt ch10
9780840024220 ppt ch10
 
Getting Started with IBM i Security: Event Auditing
Getting Started with IBM i Security: Event AuditingGetting Started with IBM i Security: Event Auditing
Getting Started with IBM i Security: Event Auditing
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and Auditing
 
File000138
File000138File000138
File000138
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
 
DockerCon Europe 2018 Monitoring & Logging Workshop
DockerCon Europe 2018 Monitoring & Logging WorkshopDockerCon Europe 2018 Monitoring & Logging Workshop
DockerCon Europe 2018 Monitoring & Logging Workshop
 
(ATS6-PLAT07) Managing AEP in an enterprise environment
(ATS6-PLAT07) Managing AEP in an enterprise environment(ATS6-PLAT07) Managing AEP in an enterprise environment
(ATS6-PLAT07) Managing AEP in an enterprise environment
 
Monitoring and Reporting for IBM i Compliance and Security
Monitoring and Reporting for IBM i Compliance and SecurityMonitoring and Reporting for IBM i Compliance and Security
Monitoring and Reporting for IBM i Compliance and Security
 
Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 Compliance
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC Access
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
 
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
 
Application hardening
Application hardeningApplication hardening
Application hardening
 
WebSphere 6.1 admin Course 3
WebSphere 6.1 admin Course 3WebSphere 6.1 admin Course 3
WebSphere 6.1 admin Course 3
 
093049ov10.pptx
093049ov10.pptx093049ov10.pptx
093049ov10.pptx
 

KĂźrzlich hochgeladen

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

KĂźrzlich hochgeladen (20)

W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Generic or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisionsGeneric or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisions
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 

UniVerse11.2 Audit Logging

  • 1. 1 UniVerse 11.2 Audit Logging Ben Peach, Technical Support Engineer
  • 2. 2 Credits and Acknowledgements Presenter • Ben Peach, Technical Support Engineer Developer • Jing Cui, CISSP, Lead Development Engineer Support Subject Matter Experts • Liam Collier, Technical Support Engineer (US) Š2015 Rocket Software, Inc. All Rights Reserved.
  • 3. 3 Abstract  U2 Database Audit Logging is a security feature that allows the capture of any event that occurs in the database. This session introduces Audit and details the architecture and components. It also includes some recommendations for best practices. Š2015 Rocket Software, Inc. All Rights Reserved.
  • 5. 5 Version specific THIS CONTENT IS SPECIFICALLY DIRECTED TO UNIVERSE 11.2. This feature changes at 11.3 Š2015 Rocket Software, Inc. All Rights Reserved.
  • 6. 6 Overview What is Audit? • Ability to capture database events What does it capture? • Who – User, Group • What – Program, Executable • Where – Account, File • When – Time, Date Š2015 Rocket Software, Inc. All Rights Reserved.
  • 7. 7 Compliance Regulations PCI DSS HIPAA and HITECH GLBA/FFIEC FISMA Other regulations Can Audit help me adhere to security regulations? Yes! Š2015 Rocket Software, Inc. All Rights Reserved.
  • 8. 8 MV Security Model U2 Database Audit Logging: • Part of a much bigger picture. Š2015 Rocket Software, Inc. All Rights Reserved.
  • 9. 9 Architecture New audman utility • OS level • Used to configure and maintain Install, enable, and disable Audit configuration file Audit log files Audit staging file Š2015 Rocket Software, Inc. All Rights Reserved.
  • 10. 10 Install, Enable, and Disable  Introduced at UniVerse 11.2.0  Charged on a per-server basis  No separate installation, just authorization  Added to license • 12345678-UV • 12345678-AUDIT  Add the package and authorize UniVerse • uvregen –p AUDIT:1 • Authorize 12345678-UV, not -AUDIT Š2015 Rocket Software, Inc. All Rights Reserved.
  • 11. 11 Audit Configuration File Used to define what is logged Housed in UniVerse home • $UVHOME/u2audit.config • %UVHOME%u2audit.config Encrypted and encoded • Text file containing cipher text Configurable via XAdmin or audman • Not directly editable Š2015 Rocket Software, Inc. All Rights Reserved.
  • 12. 12 Audit Configuration File Backed up automatically on change • $UVHOME/audit/config/u2audit.config.date.time • %UVHOME%auditconfigu2audit.config.date.time Loaded at startup • Errors logged in uvsmm.log and uvsmm.errlog • All events are logged if unable to load configuration • Can be reloaded without restarting UniVerse Default configuration file supplied at install • u2audit.config.default • A template/example file Š2015 Rocket Software, Inc. All Rights Reserved.
  • 13. 13 Audit Log Files 64-bit dynamic hashed file • Modulo 5000 • Block size 4096 Only 1 log file by default • AUDIT_LOG_MAX=1 • Must be between 1 and 8 Stored in UniVerse Home directory • $UVHOME/audit/u2audlogn (n = number of log file) • %UVHOME%auditu2audlogn (n = number of log file) • AUDIT_LOG_LOC=/disk1/uv/audit Š2015 Rocket Software, Inc. All Rights Reserved.
  • 14. 14 Audit Log Files Log file named u2audlogn • Where n is the log number (between 1 and 8) • &AUDLOGn& in VOC Files can be automatically encrypted • AUDIT_LOG_ENC=0 (Off, default) • AUDIT_LOG_ENC=1 (On) • When turning encryption on archive and clear all current logs Each log file has its own dictionary • Dictionary is reloaded on UniVerse start • Changes to existing dictionary items lost on UniVerse restart Š2015 Rocket Software, Inc. All Rights Reserved.
  • 15. 15 Audit Log Files Log record ID structure • 17396.15053.27902.8816.1 • date.time.tick.pid.sequence • Date – Internal system date • Time – Internal system time • Tick – Number of microseconds since this second started • PID – Process ID • Sequence – Sequential number to add total uniqueness Š2015 Rocket Software, Inc. All Rights Reserved.
  • 16. 16 Audit Log Files Log record contents • Event type/class – SYS, DAT, USR • Origin – Where did the event originate? (uvsh for example) • Program – The U2 Basic program (log_program_path/stack) • User, account, file, record ID • IP Address – Of the host and/or client, if available • Action – Event dependent, e.g. CreateKey for ADE key creation • Status – Exist status of the action itself • Details – Free-form description, varies greatly by event • Before Action – 0=after, 1=before • Consolidation – Details of which type of consolidation and specifics Š2015 Rocket Software, Inc. All Rights Reserved.
  • 17. 17 Audit Log Files Š 2014 Rocket Software, Inc. All Rights Reserved.
  • 18. 18 Audit Staging Files Non-session processes are unable to write directly to hashed files Failed UV process gets logged to staging Stored in UniVerse Home directory by default • $UVHOME/audit/staging • %UVHOME%auditstaging • Affected by AUDIT_LOG_LOC in uvconfig Logged events stored temporarily in individual files File are encrypted and encoded automatically Š2015 Rocket Software, Inc. All Rights Reserved.
  • 19. 19 Audit Staging Files Sweep applies events to audit log file and clears staging file • uvsmm daemon/service At UniVerse start, then every 120 seconds Interval can be changed using audman or XAdmin  audman –writestagedlog –interval n • Cannot be set to less than uvsmm interval • Reset at UniVerse restart Š2015 Rocket Software, Inc. All Rights Reserved.
  • 20. 20 uv config control uv config control Architecture Š 2013 Rocket Software, Inc. All Rights Reserved. uvsmm daemon Shared memory audlog1 audlog2 ….8 uv uvconfig U2audit config staging UV Daemons config control cache refresh map refresh audman writestagedlogadmin initiated audman admin options admin user read staging and clear enable disable refresh
  • 21. 21 Administration New utility: audman • UniVerse bin directory Extensible Administration Tool (XAdmin) • GUI Changing the configuration file • Defaults: UNIX/Linux – vi, Windows – Notepad.exe • Can be configured to use different editor  U2AUDIT_EDITOR environment variable • audman -config -editor name_of_editor for a “one off” use Š2015 Rocket Software, Inc. All Rights Reserved.
  • 22. 22 Administration Administration tasks • Configure • Display configuration • Reload configuration • Suspend/resume an audit log file • Clear an audit log file • Change sweep interval • Display audit log file status • Check/verify audit log file Š2015 Rocket Software, Inc. All Rights Reserved.
  • 23. 23 Components Classes • System, Data, User Resources • A database entity Events • Something that can happen to a resource Policies • A rule (or set of rules) Š2015 Rocket Software, Inc. All Rights Reserved.
  • 24. 24 Classes System (SYS) • Pertaining to or performed by a system process or file  System daemons, system utilities, configuration files, administrative commands  uvsmm, uvrw, uvregen, u2audit.config Data (DAT) • Pertaining to a data type object  Hashed files, indexes, schemas, tables, views User (USR) • Application dependent, user specified  Determined by use of AuditLog() in Basic Š2015 Rocket Software, Inc. All Rights Reserved.
  • 25. 25 Resources Resources are logical representations of data and system objects • A database entity to which you can point Three resource classes • System – uvsmm, uvregen, u2audit.config • Data – file, index, table, schema, view • User – determined by use of AuditLog() in Basic Š2015 Rocket Software, Inc. All Rights Reserved.
  • 26. 26 Events Action taken on a resource • WRITE to a file Use of a resource • Execution of a Basic program Three event classes • System - events at the database level • Data - actions taken on data files, schemas, indexes, etc. • User - actions taken by or on users and groups Š2015 Rocket Software, Inc. All Rights Reserved.
  • 27. 27 Policies Policies are rules defined in the configuration file Event policy • Resource/event combination type • Switch type Global policy • Configuration type • Definition type Forced policy Š2015 Rocket Software, Inc. All Rights Reserved.
  • 28. 28 Policy Terms List • Composed of objects of the same type  Events, processes, programs, users, or files • Separated by a comma (,) or a vertical bar (|)  salesEvents=DAT.BASIC.READ,DAT.BASIC.WRITE Operator • Specifies inclusion or exclusion • = set, += add, -= remove  salesEvents+=DAT.BASIC.DELETE Š2015 Rocket Software, Inc. All Rights Reserved.
  • 29. 29 Global Policies Configuration type • on_error – Stop process if audit log fails • privileged_user_audit – Log all administrative actions • log_program_path – Include program path in log record • log_program_stack – Include program stack in log record Definition type • Account – Define a shortcut or keyword to an account • Group – Define a shortcut or keyword to a group or ‘list’ Š2015 Rocket Software, Inc. All Rights Reserved.
  • 31. 31 Event Policies Resource/Event type • File – A DAT event on a data resource • User – Events from a specific user or group • Process – Events created by a process ID • Executable – Events from specific UniVerse executables • Program – Events from specific Basic programs Switch type • BeforeAction – Create the log before the event occurs • Status – Log only success, only fail or both • Consolidation – Group certain events into one log Š2015 Rocket Software, Inc. All Rights Reserved.
  • 32. 32 Event Policy Examples salesEvents.file=hssales:CUSTOMER  Note: Physical file is used, no multiple log records due to VOC pointers salesEvents.file=salesacct:* financeEvents.file=financeacct:* DAT.QUERY.*.file=/disk1/accounts/REPORTS:* SYS.SESSION.*.user=pparker,bwayne,ckent DAT.SQL.COMMAND.consolidation=counter:10 DAT.BASIC.READ.consolidation=time:60 DAT.BASIC.*.status=success DAT.BASIC.WRITE.status=both Š2015 Rocket Software, Inc. All Rights Reserved.
  • 33. 33 Forced Policies The following system events are always logged • SYS.CONFIG.CHANGE  Changes to Audit configuration  Plans for more in the future (uvconfig etc.) • SYS.SECURITY  SQL GRANT/REVOKE  Plans for more in the future (Certificates, Security Context) • SYS.ADE  Any Automatic Data Encryption action • SYS.DAEMON  Events caused by UniVerse daemons/services  uvsmm, uvcleanupd, uvapi_server, uvchkd, uvrw These statements represent Rocket Software’s current intentions. Rocket development plans are subject to change or withdrawal without further notice. Any reliance on these statements is at the relying party’s sole risk and will not create any liability or obligation for Rocket
  • 34. 34 Policy Creation Example Š2015 Rocket Software, Inc. All Rights Reserved.
  • 35. 35 Policy Creation Example Š2015 Rocket Software, Inc. All Rights Reserved.
  • 36. 36 Policy Creation Example Š2015 Rocket Software, Inc. All Rights Reserved.
  • 37. 37 Best Practices Reporting Maintenance What to audit Log file location Š2015 Rocket Software, Inc. All Rights Reserved.
  • 38. 38 Reporting Create a custom audit log dictionary Customize your dictionary entries for better presentation • SORT &AUDLOG1& USING DICT CUST.DICT.AUD PID USER EVENTNAME IPADDRESS ACTION • LIST &AUDLOG2& USING DICT CUST.DICT.AUD USER TIME Š2015 Rocket Software, Inc. All Rights Reserved.
  • 39. 39 Maintenance Log files are hashed files like any other • Poor sizing means poor performance • FILE.STAT, RESIZE, etc. • Check regularly with fixtool Backup! • Make them part of your regular backup • Consider publishing with U2 Replication  CAUTION: Can cause large performance overload Š2015 Rocket Software, Inc. All Rights Reserved.
  • 40. 40 Maintenance Š 2013 Rocket Software, Inc. All Rights Reserved. audlog1 audlog2 write write 1) Suspend Log 2 audman –suspendlog 2 read 2) Archive, maintenance Tool of your choice 3) Clear Log 2 audman –clearlog 2 4) Resume Log 2 audman –resumelog 2 Logging continues uninterrupted!
  • 41. 41 Maintenance Š 2013 Rocket Software, Inc. All Rights Reserved. audlog1 audlog2 write write 1) Suspend Log 1 audman –suspendlog 1 read 2) Archive, maintenance Tool of your choice 3) Clear Log 1 audman –clearlog 1 4) Resume Log 1 audman –resumelog 1 Records have been archived using your preferred method and no downtime at all!
  • 42. 42 Maintenance Š2015 Rocket Software, Inc. All Rights Reserved.
  • 43. 43 What to Audit Compliancy regulations • Does my compliancy regulation force me to audit these events/resources? Performance considerations • Can I live without auditing this event/resource? Space considerations • Do I have enough disk to store these log records? Š2015 Rocket Software, Inc. All Rights Reserved.
  • 44. 44 Log File Location Bottom line: Find the best I/O • Files can be very busy • Use a separate disk if possible • An SSD is preferred Š2015 Rocket Software, Inc. All Rights Reserved.
  • 46. 46 MV Security Model U2 Database Audit Logging: • Part of a much bigger picture. Š2015 Rocket Software, Inc. All Rights Reserved.
  • 47. 47 Additional Resources  Links http://www.rocketsoftware.com http://en.wikipedia.org/wiki/Category:Security_compliance http://www.rocketsoftware.com/resource/u2-technical-documentation  Need help? U2support@rocketsoftware.com support.rocketsoftware.com http://www.rocketsoftware.com/rocket-u2-professional-services-request Š2015 Rocket Software, Inc. All Rights Reserved.
  • 48. 48 Disclaimer THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE EFFORTS WERE MADE TO VERIFY THE COMPLETENESS AND ACCURACY OF THE INFORMATION CONTAINED IN THIS PRESENTATION, IT IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. IN ADDITION, THIS INFORMATION IS BASED ON ROCKET SOFTWARE’S CURRENT PRODUCT PLANS AND STRATEGY, WHICH ARE SUBJECT TO CHANGE BY ROCKET SOFTWAREWITHOUT NOTICE. ROCKET SOFTWARE SHALL NOT BE RESPONSIBLE FOR ANY DAMAGES ARISING OUT OF THE USE OF, OR OTHERWISE RELATED TO, THIS PRESENTATION OR ANY OTHER DOCUMENTATION. NOTHING CONTAINED IN THIS PRESENTATION IS INTENDED TO, OR SHALL HAVE THE EFFECT OF: • CREATING ANY WARRANTY OR REPRESENTATION FROM ROCKET SOFTWARE(OR ITS AFFILIATES OR ITS OR THEIR SUPPLIERS AND/OR LICENSORS); OR • ALTERING THE TERMS AND CONDITIONS OF THE APPLICABLE LICENSE AGREEMENT GOVERNING THE USE OF ROCKET SOFTWARE. Š2015 Rocket Software, Inc. All Rights Reserved.
  • 49. 49 Trademarks and Acknowledgements The trademarks and service marks identified in the following list are the exclusive properties of Rocket Software, Inc. and its subsidiaries (collectively, “Rocket Software”). These marks are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. Not all trademarks owned by Rocket Software are listed. The absence of a mark from this page neither constitutes a waiver of any intellectual property rights that Rocket Software has established in its marks nor means that Rocket Software is not owner of any such marks. Aldon, CorVu, Dynamic Connect, D3, FlashConnect, Pick, mvBase, MvEnterprise, NetCure, Rocket, SystemBuilder, U2, U2 Web Development Environment, UniData, UniVerse, and wIntegrate Other company, product, and service names mentioned herein may be trademarks or service marks of others. Š2015 Rocket Software, Inc. All Rights Reserved.
  • 50. 50