[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Initial Logging capabiltiies document



Comments inline.   Search for "gmj>".

----George

Abstract

  This document lists logging capabilities needed to support the
  current practices described in Operational Security Current Practices
  [CURPRAC] and logical enhancements to those practices if the
  capability existed.

gmj> Awkward.  Try "[CURPRAC].  It also lists capabilities needed
gmj> to support good security practices not listed in [CURPRAC].

1.1.  Threat Model

  The logging capabilities are derived from real world observations
  where unexpected activities in a network infrastructure caused
  concern to the network operator.  Examples of such activities are:

     An adversary or unauthorized user login into an infrastructure
     device.  The risk is that the configuration or other operating
     parameter could be modified.

     A device becomes overwhelmed, throttles, or crashes.  An unaware
     operator cannot return the device to optimal operating conditions

gmj>  Replace that last sentance:  "Without logging or some other mechanism
gmj>  to notifify the operator of the condition, the operator will not know
gmj>  that action is required to return the device to optimal
operating condition."

     Network problems cannot be properly diagnosed without information.
     Information does not exist unless generated

  Threats to the network devices may be classified into broad
  categories such as the device status or configuration is modified
  without notice by the network operator, captured data traffic or
  notification messages from the device are intercepted by a third
  party, or logging data may not be properly stored rendering forensic
  activity worthless.

gmj> s/previous paragraph/
gmj>    Threats to the network devices may be classified into broad
gmj>    categories such as:
gmj>
gmj>      * Unexpected device status or configuration change
gmj>      * Failure to send log messages
gmj>      * Interception of log messages
gmj>      * Failure to store log messages/


1.2.  Capabilities or Requirements ?

gmj> s/or/vs./,s/ ?//

  Capabilities may or may not be requirements.  That is a local
  determination that must be made by each operator with reference to



Cain                    Expires December 28, 2006               [Page 3]

Internet-Draft            Logging Capabilities                 June 2006


  the policies that they must support.  This document, together with
  [CURPRAC] will assist network operators in identifying their security
  capability requirements and communicating them clearly to vendors.

gmj> May also want to cite profiles here (if we do them).

gmj> Thses sections (1.2-1.4) should be boilerlate for capabilities docs.

1.4.  Definitions

  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
  "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
  document are to be interpreted as described in [RFC2119].

  The use of the RFC 2119 keywords is an attempt, by the author, to
  assign an expectation level ("MUST", "SHOULD", "MAY") to the each
  capability.  It must be noted that different organizations,
  operational environments, policies and legal environments will
  generate different requirement levels.

  NOTE: This document defines capabilities.  This document does not
  define requirements, and there is no requirement that any particular
  capability be implemented or deployed.  The use of the terms MUST,
  SHOULD, and so on are in the context of each capability in the sense
  that if you conform to any particular capability then you MUST or
  SHOULD do what is specified for that capability, but there is no
  requirement that you actually do conform to any particular
  capability.

gmj> These last two paragraphs look like 3871 boilerplate.  The
framework addresses
gmj> these.  They don't need to be here.  Leave the first paragraph
(the required
gmj> citation of RFC2119) in, but don't use the keywords in the
capability descritions.


Cain                    Expires December 28, 2006               [Page 4]

Internet-Draft            Logging Capabilities                 June 2006


2.  Functional Capabilities of Log Generating Systems

  The capabilities in this section are intended to list testable,
  functional capabilities that are needed to operate devices securely
  and meet the obligations of Section Threat Model.

2.1.   Logging Facility Uses Protocols Subject To Open Review

  Capability

     The device MUST provide a logging facility that is based on

gmj>  1,$s/MUST provide/provides/g

     protocols subject to open review.  Custom or proprietary logging
     protocols MAY be implemented provided the same information is made
     available.

2.17.2.   Configurable Destination TCP Port

  Capability

     Devices should allow for the configuration of the destination
     syslog TCP port number.

gmj> Standard syslog rides on UDP.


3.  Functional Capabilities of Log Storage Systems

gmj> I would argue that these are out of scope.

4.  Additional Operational Practices

  This section describes practices not covered in [CURPRAC].  They are
  included here to provide justification for capabilities that
  reference them.

  This section will be populated from comments received on this
  internet-draft.

gmj> good.  All capabilities drafts should have a section like this....
gmj> if no capababiliites are added in addition to those in Merike's draft,
gmj> it just gets deleted prior to publication.


5.  Security Considerations

  Security capabilities of network devices is the subject matter of
  this entire memo.  The capabilities listed cite practices in
  [CURPRAC] that they are intended to support.  [CURPRAC] also defines
  the general threat model, practices, and lists justifications for
  each practice.

gmj> You should have Chris Lonvick and crew look this over (Chris ?)

---George