Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Ninth Log Management Survey Report Using the results of the 2014 Log Management Survey, this paper identifies strengths and weaknesses in log management systems and practices, and provides advice for improving visibility across systems with proper log collection, normalization and analysis. Copyright SANS Institute Author Retains Full Rights Ninth Log Management Survey Report A SANS Survey Written by Jerry Shenk Advisor: Barbara Filkins October 2014 Sponsored by VMware ©2014 SANS™ Institute Executive Summary With more reports of complex, blended threats succeeding in breaches and data exfiltration, logs are as important as ever to organizations. Most organizations today are collecting logs, and many of them are sending those logs to a security information and event management (SIEM) system for analysis, according to the 2014 SANS Log Management Survey, which was recently taken by 522 respondents. Although we Highlights of the 9th Log Management Survey • Log collection is common practice: 97% of respondents collect logs. • Drivers for collecting logs: 85% to detect and track suspicious behavior, 67% to support routine operations, 62% for forensics analysis. (Respondents were allowed to check all that apply.) • Visibility is still a challenge: 35% cite correlation of logs from multiple sources, and 27% cite inability to distinguish between normal and suspicious traffic as a top challenge. • Time spent on logs: 22% spend 1–4 hours a week; another 22% spend more than one day a week examining logs. • Categorization would help: 14% cite normalization and categorization of logs and security information as key challenges. recognize that the SANS audience may be more prone to taking key steps to enhance their security, it is noteworthy that 97% of respondents indicated that they collected logs, and 42% are sending logs to a SIEM system. An additional 29% collect and consolidate logs into one or more log servers. When SANS began these surveys in 2005, just collecting the logs was a problem. And, with more people collecting logs and more logs being processed from more systems, past SANS Log Management Surveys indicated that organizations found it difficult to detect blended, advanced threats. Organizations are still having trouble using logs for this purpose, with 46% stating this was their most difficult outcome to achieve with their current capabilities. The reason? Respondents complain of difficulties related to correlation of logs from multiple sources and the inability to distinguish between normal and malicious traffic. The largest group of respondents (28%) reported that analysis of “big data” was the most challenging, while 22% cited correlation of logs from • Virtualization is no problem: 69% are logging activities in their virtual apps. disparate sources, and 14% pointed to normalization and categorization • Cloud causes log management headaches: 22% are using log management for cloud systems. management. Organizations need to know their own networks to identify • Automation and integration are helping: 86% of organizations describe log management integration as partial or full. searches to both instruct on network normalcy and detect abnormalities. of logs and security information as the most difficult aspects of log suspicious behaviors. This requires careful construction of a variety of New trends in computing are also affecting log management capabilities, particularly the cloud. Survey responses indicate confusion over where to turn for log management and reporting against cloud-based usage, with 28% of respondents saying they rely on their cloud provider to be secure, another 19% adjusting their internal controls to track cloud operations, and 25% using cloud-based tools or services to monitor their logs. SANS ANALYST PROGRAM 1 SANS Ninth Log Management Survey Report Executive Summary (CONTINUED) Despite these challenges, organizations have made a great deal of progress in automating log management and analysis over the nine years SANS has conducted this survey. In the current survey, 46% say they have achieved partial automation of both the log management and analysis process; 30% have achieved complete automation of log management, but not analysis; and 11% have completed automation of both functions. Using the results of the 2014 Log Management Survey, this paper identifies strengths and weaknesses in log management systems and practices, and provides advice for improving visibility across systems with proper log collection, normalization and analysis. SANS ANALYST PROGRAM 2 SANS Ninth Log Management Survey Report Survey Demographics The survey was taken by representatives of a variety of organizational types and sizes, as well as by many types of IT professionals, indicating that logs are important across industries and no specific job role is set aside for managing and reviewing logs. All Types Government (which employs many people), was represented by 19% of the sample, with 16% of respondents from financial services and 15% from high tech/IT services. Health care/pharmaceuticals and education were also strongly represented in this survey, as shown in Figure 1. Religous/Nonprofit Legal Engineering/Construction Manufacturing ISP/Hosting/Service provider Telecommunications carrier/ Service provider Retail Insurance Energy/Utilities Education Other Health care/Pharmaceutical High tech/IT services Financial Government What is your company’s primary industry? Figure 1. Industries Representation This vertical breakdown is relatively standard for the overall SANS membership and indicates how important logs are across industry types. SANS ANALYST PROGRAM 3 SANS Ninth Log Management Survey Report Survey Demographics (CONTINUED) All Sizes Participants’ organizations are evenly distributed between very large (50,000 or more employees), medium (2,000-4,999 employees) and small (100-499 employees) entities, as shown in Figure 2. Fewer than 100 employees 100 to 499 employees 500 to 999 employees 1,000 to 1,999 employees 2,000 to 4,999 employees 5,000 to 9,999 employees 10,000 to 24,999 employees 25,000 to 49,999 employees 50,000 or more employees How large is your organization? Figure 2. Organizational Size SANS ANALYST PROGRAM 4 SANS Ninth Log Management Survey Report Survey Demographics (CONTINUED) Many Roles The survey responses also show that many different roles are involved in log management. By far, the largest role represented in the survey was security administration/security analysts (41%). Security management roles—security manager/ security director/chief security officer (CSO)/chief information security officer (CISO)— accounted for 18% of respondents (see Figure 3). What is your primary role in the organization, whether as staff or consultant? Developer Compliance officer/ Auditor Network or system engineering Other Incident responder/ Forensics professional Network operations/ System administration IT manager/IT director/CIO Security manager/ Security director/CSO/CISO Percentage of respondents filling a security administration/ security analyst role Security administration/ Security analyst 41% Figure 3. Respondent Roles Many of the “Other” titles fell under project management/architecture and engineering roles. This indicates that logs—and the value they provide—are important to administrators, managers and developers across all types of organizations. SANS ANALYST PROGRAM 5 SANS Ninth Log Management Survey Report Log Collection Practices and Challenges In the current survey, 97% of respondent organizations collect logs, showing ongoing gains in log management from our 2011 survey,1 in which 87% collected logs, and our 2012 survey,2 in which 89% collected logs. Top reasons for collecting logs have not changed much since our past two surveys. In this year’s survey (illustrated in Figure 4) and in the 2012 survey, the top reasons for collecting logs, in order, are to: • Detect/track suspicious behavior (85%) • Support IT/network routine maintenance (65%) • Support forensic analysis (62%) • Troubleshoot (59%) Other Understand and derive information about customer behavior Support internal business processes (e.g., reporting, chargeback) Manage/Reduce costs for IT and security Monitor service levels/Lines of business application performance Monitor and track application and system operational performance Prevent incidents Meet/Prove compliance with regulatory requirements Detect advanced persistent threat (APT)-style malware Troubleshooting Support forensic analysis Support IT/Network routine maintenance and operations Detect/Track suspicious behavior (e.g., unauthorized access, insider abuse) Why does your organization collect logs? Select all that apply. Figure 4. Reasons for Collecting Logs In the 2012 survey, detecting and tracking suspicious behavior was selected by 82% of respondents, supporting forensic analysis by 65%, and preventing incidents by 58% as the most important uses for their logs. Although preventing incidents was 6 percentage points away from making the top reasons for logging in 2014, 53% of respondents still believe it is a key reason for collecting logs. In both surveys, meeting or providing regulatory compliance fell in the middle, with 53% choosing the option in 2014 and 55% choosing it in 2012. SANS ANALYST PROGRAM 1 www.sans.org/reading-room/whitepapers/analyst/seventh-annual-log-management-survey-report-34995 2 www.sans.org/reading-room/whitepapers/analyst/eighth-annual-2012-log-event-management-survey-results-sorting-noise-35230 6 SANS Ninth Log Management Survey Report Log Collection Practices and Challenges (CONTINUED) Although organizations are clearly seeing value in logs for security and compliance, they don’t seem to be using logs for business purposes and efficiencies yet. As in our 2012 survey, this year’s respondents are underutilizing their logs for the purposes of understanding and deriving information about customer behavior, supporting internal business processes, and managing/reducing IT and security costs. Log Management Challenges This year we added a follow-up question about the difficulty of using logs: whether organizations actually succeed in using logs for their desired purposes. In other words, if an organization stated that detecting and tracking suspicious behavior was one of its reasons for collecting logs, how easy was it for the organization to perform that function? Organizations are having the most difficulty using their logs for the top reasons they collect logs, particularly in detecting APT-style malware, preventing incidents and tracking suspicious behavior, which are the top three selections rated as “most difficult,” as shown in Figure 5. Easy Moderate Troubleshooting Support internal business processes (e.g., reporting, chargeback) Understand and derive information about customer behavior Manage/Reduce costs for IT and security Meet/Prove compliance with regulatory requirements Support forensic analysis Monitor and track application and system operational performance Prevent incidents Detect APT-style malware Detect/Track suspicious behavior (e.g., unauthorized access, insider abuse) Monitor services levels/Line of business application performance Support IT/Network routine maintenance and operations How difficult is it for you to utilize the log data you collect for the following reasons? Rate each reason that applies to your organization. Choose only those that apply. Difficult Figure 5. Level of Difficulty in Achieving Log Objectives SANS ANALYST PROGRAM 7 SANS Ninth Log Management Survey Report Log Collection Practices and Challenges (CONTINUED) Recall the top four reasons for collecting logs: to detect/track suspicious behavior, support forensic analysis, support IT/network routine maintenance and operations, and troubleshooting. These top four reasons for collecting logs fit into two larger categories: forensic analysis, which includes detecting and tracking suspicious behavior and the closely related reason, supporting forensic analysis; and maintenance and operations, which includes supporting IT/network routine maintenance and operations and troubleshooting. Difficulties in Forensic Analysis So, how well did current log management procedures meet those needs? Out of the 85% for whom detection and tracking of suspicious behavior was a stated need, 50% stated that it was moderately difficult and 30% stated that it was difficult. Those who selected support forensic analysis had similar levels of difficulty: 53% moderate and 21% difficult. TOP CHALLENGES: Analysis of big data, correlation of data from disparate sources, and normalization and Why are they having difficulty detecting and tracking suspicious behavior or supporting forensic analysis? Overall, the most challenging issue, cited by 28% of respondents, is analysis of big data, which we defined as large volumes and types of log and event information for processing. The second and third challenges are related to their top challenge and include correlation of data from disparate sources, which was ranked most challenging by 22% of respondents; and normalization and categorization of log and security information, which was ranked as most challenging by 14% of respondents (see Figure 6). What do you consider overall both the most challenging and the least challenging aspects of log and event management? categorization of log and Retention of logs and secuirty data Reporting Analysis of “big data” (large volumes and types of log and event information for for processing) Least Challenging Managing log and event data, including maintaining chain of custody Most Challenging Storing/Archiving Searching Normalizing and categorizing log and security information Correlation of logs from disparate sources Completeness of logs and security information for forensics Collecting logs security information Figure 6. Most and Least Challenging Aspects of Log and Event Management SANS ANALYST PROGRAM 8 SANS Ninth Log Management Survey Report Log Collection Practices and Challenges (CONTINUED) For anyone who has worked with logs for any length of time, these top problems come as no surprise. The Achilles’ heel of any log analyzer is the fact that vendors log similar events differently. Correlation and normalization have always been difficult. The term correlation refers Often, even different versions of devices or software from the same company report the to linking separate events same event differently. This makes it difficult for an operator to compare the event log together to identify an from one device (or piece of software) with the event log from another device. Without incident. Normalization refers correlation and normalization, an operator must manually recognize that a login failure to the way different devices report the same event in different ways. Normalization on one Windows domain is similar to a login failure on a wireless access point. Once normalization has been done, events can be correlated to identify suspicious behavior. For example, if many failed login attempts occur on many endpoints (workstations, servers or websites) for a single domain account in a short period of time, correlation can generally refers to a process tie together these seemingly disparate events based on policies used to detect them. that is done by log analysis When we combine this answer set with respondents’ answers for why they collect data, software or a SIEM. we get more detail. For those who need to detect/track suspicious behavior, 52% stated that correlation of logs and event data coming from multiple types of devices was their top problem. Similarly, of those who chose supporting forensic analysis as their top need, 54% cited correlation of results from multiple types of devices. Difficulties in Maintenance and Operations The second most common reason for collecting logs is to support IT/network routine maintenance and operations, selected by 65% of respondents, and the fourth most common reason was for troubleshooting (59%). Of the respondents who chose support TOP CHALLENGES: IT/network routine maintenance and operations as a reason for collecting logs, 39% ranked that as easy, 48% as moderately difficult and 13% as difficult. Using the same Inability to sort and criteria, troubleshooting was rated as being easy by 37%, moderately difficult by 55% distinguish key events and difficult by 8%. In this group the top two challenges were the inability to sort and from normal activity, and identify key events from normal background activity and correlation of log and event correlation of log and event data from disparate sources data coming from multiple types of devices. This points to lack of visibility that log and event management, particularly if run through a management system such as a SIEM, are supposed to help solve. Once again, the different ways that devices’ log events are expressed (need for normalization) and processed together (need for correlation) are key stumbling blocks for organizations in using their log management and SIEM systems as more data is collected across the enterprise. SANS ANALYST PROGRAM 9 SANS Ninth Log Management Survey Report Log Collection Practices and Challenges (CONTINUED) Areas of Concern TAKEAWAY: Focus on ways to distinguish normal and malicious activities, as well as on There are two primary reasons for problems with detection and tracking of suspicious behavior as well as tracking and dealing with nonsecurity IT-related issues. One issue is that the log management software or a SIEM doesn’t process the events correctly. That could be due either to a fault in the software or complications introduced by changes in the way logs are created by the varied devices supported by an organization. The improving the integration of second problem could be that the organization expects the software to automatically all log-gathering devices. do everything for it. All log management software and SIEM systems need some kind of setup, and they need to be maintained as systems, software and the attacks launched against them change. SANS ANALYST PROGRAM 10 SANS Ninth Log Management Survey Report Managing Log Data Additional issues surrounding log data include the sources from which the data is gathered, the amount of data logged each day, how much time organizations spend managing their logs and how long organizations should retain log data. Log Sources Are Everywhere In the past, log data was primarily collected from firewalls and servers. More recently, the list of devices from which organizations are collecting logs includes just about everything, including security devices (85%), network devices (85%) and servers (Windows at 84% and UNIX-type servers at 66%). Virtual environments (virtual servers, networks, hypervisors, platforms) are being logged by 69% of organizations, as shown in Figure 7. How difficult is it for you to utilize the log data you collect for the following reasons? Rate each reason that applies to your organization. Choose only those that apply. Other Physical plant systems (e.g., HVAC, SCADA systems) Outsourced services and/or applications Mobile devices (smartphones, tablets) Cloud-based services and/or applications Mainframes Building access systems Desktops/Laptops Line of business applications (homegrown, custom, database systems, commercial off-the-shelf ) Web applications UNIX-type servers (Linux, SCO, Sun, etc.) Virtual environments (virtual servers, networks, hypervisors, platforms) Windows servers Network devices (switches, routers) Security devices (firewalls/IDS/IPS/antivirus Figure 7. Sources of Log Data In our 2012 survey, physical plant systems, which include HVAC and SCADA systems, were monitored by 9% of respondents; in 2014, 12% gathered logs from such systems. In 2012, 8% collected logs from cloud-based and outsourced services. In 2014, 12% collected logs on outsourced services and 22% collected logs from cloud-based systems. Open-ended responses in the 2014 survey answers under the “Other” option include UPS and phone systems, indicating the addition of even more sources of log data that need to be normalized and correlated for visibility and response. SANS ANALYST PROGRAM 11 SANS Ninth Log Management Survey Report Managing Log Data (CONTINUED) Together, these sources of log data generate large amounts of data to be analyzed. As illustrated in Figure 8, the largest portion of respondents (30%) collect less than 50GB of data per day, while 8% gather 1TB or more of data. How much data do you log per day? TAKEAWAY: Organizations must be able to Unknown Over 5TB 1 to 5TB 501GB to 1TB 101 to 500GB and future needs. 51 to 100GB technologies to their current Less than 50GB scale their log management Figure 8. Log Data Generated As the collection sources and data types continue to grow, so too must the ability to manage and analyze larger amounts of log data. Organizations must consider the ability to scale their log management methodologies to the future growth of traditional and nontraditional devices. SANS ANALYST PROGRAM 12 SANS Ninth Log Management Survey Report Managing Log Data (CONTINUED) Time Spent on Logs With growing numbers of data sources and a larger body of log data being generated, the amount of time organizations devote to analyzing logs becomes more important. The answer to the question of how long log management takes is, of course: “It depends.” Overall, the most selected time frame was one to four hours per week (22%), with more than a day per week coming in a few tenths of a percentage point lower, but statistically tied at 22% (see Figure 9). Other We outsource analysis and just review the sumary of those results More than a day per week One day per week 4–8 hours per week 1–4 hours per week Less than 1 hour per week Unknown How much time does your organization normally commit to analyzing logs each month? Figure 9. Time Devoted to Analyzing Logs The size of the organization does matter slightly. For large organizations, that is, those with more than 50,000 employees, the largest group of respondents (35%) stated that they spent more than one day per week on log analysis. The largest group of moderatesized companies (2,000 to 4,999 employees) also spend more than a day a week (25%). In small organizations, 33% reported that they spent between one and four hours a week on log analysis. SANS ANALYST PROGRAM 13 SANS Ninth Log Management Survey Report Managing Log Data (CONTINUED) Log Data Retention The reasons for storing logs and the length of time for which logs are stored vary based on the type of organization and its regulatory requirements. The largest portion of respondents (40%) maintain logs for 90 days to one year, 34% maintain logs for one to seven years, 29% maintain data for 30 to 90 days, 11% maintain log data for less than 30 days, and another 11% let it default to the standards for the application, operating system or utility that is doing the logging. In 2012, results were somewhat different. The largest percentage of respondents (39%) kept logs for one to seven years, while 35% kept logs for 90 days to one year, 19% for 30 to 90 days, 9% kept for less than 30 days, and 9% retained logs to defaults. Reasons for log retention periods, illustrated in Figure 10, include investigations/ forensics (selected by a total of 68% of respondents), regulatory compliance (64%) and legal/company policies (60%). What are the top three reasons that influence the retention period for your logs? Regulatory compliance Legal (company policy) Investigations/Forensics Historical/Trending analysis General company practice First Second Third Figure 10. Reasons for Log Retention Time Frames Since we first started asking about log retention in these surveys, regulatory compliance has been one of the main drivers for determining log data retention policy. This year, we provided an open-ended comment option on this question. One thing we hadn’t anticipated was the number of comments about cost and availability of storage space being the driving factor for log retention for a few respondents. The “logging price” of storing the large amounts of data is, indeed, an important consideration. SANS ANALYST PROGRAM 14 SANS Ninth Log Management Survey Report Real-World Search Criteria This year’s survey threw in a wild-card question about respondents’ most common search strings when they go through logs. The most common responses were: • Searching for login/logout data, failed logins, password failures and related queries • Searching for traffic to and from computers that had been involved in malware, botnets and other suspicious activity to determine when a compromise started, what IP addresses (internal and external) were related and how much data was transferred • Tracking VPN users and the times, locations and frequency of connections • DNS requests Some respondents gave examples of specific ways they use log data to look for advanced persistent threat (APT)-type attacks. One looks for “unusual traffic in a very large amount of data (APT).” This matches a recommendation we made in our 2010 Being able to detect unusual traffic is a good reason why log managers need to survey,3 and one that others have recommended as well. Being able to detect unusual traffic is a good reason why log managers need to know their data and what is normal in their network. A methodical approach to knowing your data could be called baselining known behaviors and uses of technology to detect abnormalities, which has been promoted by Anton Chuvakin4 for years. To look for know their data and unusual traffic, the respondent has to take the time to know what normal data transfers what is normal in are for his or her organization, which allows the organization to recognize transfers that their network. are outside of what is normal for it. Another instructive example of log searches is a respondent who tracks VPN connections and the associated user accounts and IP addresses and then alerts if a user connects from different locations. This type of information can give visibility into an account that has been compromised. This same type of monitoring could also apply to webmail access and any other type of external connections to Internet-accessible company resources. There were many more interesting suggestions that highlighted the need to understand your own network and then to build automated alerting into log management and SIEM tools. SANS ANALYST PROGRAM 3 www.sans.org/reading-room/whitepapers/analyst/sixth-annual-log-management-survey-report-34880 4 www.slideshare.net/anton_chuvakin/baselining-logs 15 SANS Ninth Log Management Survey Report Applications Hosted in the Cloud In this year’s survey, 40% of respondents say they have no need to monitor apps in the cloud. Either those respondents don’t have any applications hosted in the cloud or they don’t see a need to monitor the logs in those applications. Another 19% responded that 1 to 3% of their applications needing monitoring were hosted in the cloud, 11% estimated 3 to 5%, and 14% said 6 to 10% (see Figure 11). What percent of your applications that need monitoring are hosted in third-party cloud providers? 0% 1–3% 3–5% 6–10% 11–25% 26–50% More than 50% Figure 11. Monitoring of Cloud-Based Applications The other reason they may not be monitoring their cloud apps is because respondents believe their hosting provider is doing it for them. In this year’s survey, 28% said they rely on their cloud operator for security of their apps and data in the cloud, as illustrated in Figure 12. What are you doing to monitor logs for cloud-based computing applications? R elying on our cloud operator to be secure for us Other A djusting internal log management controls to track cloud operations U sing cloud-provided monitoring tools U sing cloud-provided monitoring services Figure 12. Methods of Monitoring Logs for Cloud-Based Applications SANS ANALYST PROGRAM 16 SANS Ninth Log Management Survey Report Applications Hosted in the Cloud (CONTINUED) SANS feels strongly that relying on the service provider for security of cloud apps is the wrong answer. With some of the recent breaches of cloud providers and other “trusted” companies, it’s good to remember that, as Graham Cluley says in the title of his Dec. 3, 2013, blog post,5 “Don’t call it ‘the cloud.’ Call it ‘someone else’s computer.’” Perhaps “someone else’s computer” is more secure than yours, but don’t just assume it is being TAKEAWAY: Discover what your cloud provider will do to assist in log management and analysis. Then, plan for how you can protected correctly. Those who are attempting to monitor their cloud apps are doing so primarily through their own log management systems, followed by using cloud-provider tools and services. The “Other” response was chosen by the 27% of respondents. Closer examination of those responses indicates that many do not have cloud-based applications, while others are struggling with what to do and how to do it. Some of the monitor the logs effectively. comments indicate that some cloud services don’t give much in the way of logs. One Don’t ignore the cloud! comment in particular reflects this: “Our largest cloud operator does not permit access to logs.” Another respondent explains: “I have two [cloud providers]; one sends [its] logs, the other I have to trust.” Many organizations are still in a similar stage of maturity—and have been during the years SANS has been doing this survey. Cloud computing—and the means to log activities within the cloud—will be interesting to watch over the next few years. 5 SANS ANALYST PROGRAM http://grahamcluley.com/2013/12/cloud-privacy-computer 17 SANS Ninth Log Management Survey Report Automation: The Key to Success It seems that every year, automation of log analysis becomes more important. Over time, the term SIEM has become widely used to claim some form of automated processing and/or alerting about suspicious events. In this year’s survey, 42% of respondents stated that they use a SIEM, and 52% do some type of automated analysis of log data. Another 29% consolidate logs into one or more log servers; undoubtedly some of these log servers also do some automated reporting and log analytics. Move Beyond SIEM Searches Given the current amount of log data, automation is the key to managing it. One of the key tenets of the Critical Security Controls is automation.6 Log management has come a long way toward automation, according to this year’s survey. In it, 46% have partially automated log management and analysis; 30% have completely automated log management, but not analysis (up from 11% in 2012); 11% have completely automated both log management and analysis; and just 12% remain completely manual (see Figure 13). What is the level of automation you currently use to collect, analyze and manage your log data? Select the most applicable. P artially automated log management and analysis processes A utomated only log management but not analysis Completely manual C ompletely automated log management and anlysis processes Other Figure 13. Current State of Automation In 2012, 7% of respondents indicated they weren’t automated at all and didn’t plan any change, 15% were partially automated and didn’t plan any changes, and 11% were already fully automated for log management but not analysis. Now, two years later, organizations have made a great deal of progress. 6 SANS ANALYST PROGRAM www.counciloncybersecurity.org/critical-controls 18 SANS Ninth Log Management Survey Report Automation: The Key to Success (CONTINUED) Over the next two years, respondents expect to make even more progress with automating their log management and analysis, when many more plan on being completely or partially automated, as shown in Figure 14. What is the level of automation you are planning to use for the collection, analysis and management of your log data over the next two years? Select the most applicable. P artially automated log management and analysis processes TAKEAWAY: Automation is the key to managing and analyzing A utomated only log management but not analysis the large amounts of Completely manual data associated with log C ompletely automated log management and anlysis processes management and SIEM Other systems. Figure 14. Expected Automation Progress It is nice to see that, in the future, fewer organizations will rely on completely manual management and analysis (as represented by the green sections of Figures 13 and 14). The number of organizations partially automating both log management and analysis or completely automating both functions (represented by the blue and purple sections, respectively) should get larger as organizations more fully embrace the concept of automation. SANS ANALYST PROGRAM 19 SANS Ninth Log Management Survey Report Summary: A Long Way, Baby The past decade’s log management practices simply won’t do in today’s fast-paced threat environment, in which new technologies, such as cloud and mobile computing, make detection and visibility more difficult. When SANS first started publishing the log management survey, respondents collected event logs, computer logs, firewall logs, web logs and recorded other activities—and most people tried to review them manually or wrote their own scripts to pull out the most interesting bits they could analyze, such as failed logins and blocked ports. These were the early days of log analytics, even though that wasn’t a term yet. Log management has come a long way since then. Current log management software can store vast amounts of data and do analysis on events, producing reports and analysis. Better normalization, analysis and automation are occurring, and organizations plan to automate more of these functions. However, automation is spotty, and collecting logs from the cloud is still difficult and confusing for those who took this survey. This represents a continued area of improvement for both organizations and log management/SIEM vendors. In particular, they need to continue their efforts to normalize data for better correlation, analysis and visibility—all of which are needed to detect and manage risk across diverse IT environments. SANS ANALYST PROGRAM 20 SANS Ninth Log Management Survey Report About the Author Jerry Shenk currently serves as a senior analyst for the SANS Institute and is senior security analyst for Windstream Communications, working out of the company’s Ephrata, Pennsylvania location. Since 1984, he has consulted with companies and financial and educational institutions on issues of network design, security, forensic analysis and penetration testing. His experience spans networks of all sizes, from small home-office systems to global networks. Along with some vendor-specific certifications, Jerry holds six Global Information Assurance Certifications (GIACs), all completed with honors: GIACCertified Intrusion Analyst (GCIA), GIAC-Certified Incident Handler (GCIH), GIAC-Certified Firewall Analyst (GCFW), GIAC Systems and Network Auditor (GSNA), GIAC Penetration Tester (GPEN) and GIACCertified Forensic Analyst (GCFA). Five of his certifications are Gold certifications. He also holds the CISSP certification. Sponsor SANS would like to thank this survey’s sponsor: SANS ANALYST PROGRAM 21 SANS Ninth Log Management Survey Report Last Updated: June 14th, 2017 Upcoming SANS Training Click Here for a full list of all Upcoming SANS Events by Location DFIR Summit & Training 2017 Austin, TXUS Jun 22, 2017 - Jun 29, 2017 Live Event SANS Paris 2017 Paris, FR Jun 26, 2017 - Jul 01, 2017 Live Event SANS Cyber Defence Canberra 2017 Canberra, AU Jun 26, 2017 - Jul 08, 2017 Live Event SANS Columbia, MD 2017 Columbia, MDUS Jun 26, 2017 - Jul 01, 2017 Live Event SEC564:Red Team Ops San Diego, CAUS Jun 29, 2017 - Jun 30, 2017 Live Event SANS London July 2017 London, GB Jul 03, 2017 - Jul 08, 2017 Live Event Cyber Defence Japan 2017 Tokyo, JP Jul 05, 2017 - Jul 15, 2017 Live Event SANS Los Angeles - Long Beach 2017 Long Beach, CAUS Jul 10, 2017 - Jul 15, 2017 Live Event SANS Cyber Defence Singapore 2017 Singapore, SG Jul 10, 2017 - Jul 15, 2017 Live Event SANS ICS & Energy-Houston 2017 Houston, TXUS Jul 10, 2017 - Jul 15, 2017 Live Event SANS Munich Summer 2017 Munich, DE Jul 10, 2017 - Jul 15, 2017 Live Event SANSFIRE 2017 Washington, DCUS Jul 22, 2017 - Jul 29, 2017 Live Event Security Awareness Summit & Training 2017 Nashville, TNUS Jul 31, 2017 - Aug 09, 2017 Live Event SANS San Antonio 2017 San Antonio, TXUS Aug 06, 2017 - Aug 11, 2017 Live Event SANS Hyderabad 2017 Hyderabad, IN Aug 07, 2017 - Aug 12, 2017 Live Event SANS Prague 2017 Prague, CZ Aug 07, 2017 - Aug 12, 2017 Live Event SANS Boston 2017 Boston, MAUS Aug 07, 2017 - Aug 12, 2017 Live Event SANS New York City 2017 New York City, NYUS Aug 14, 2017 - Aug 19, 2017 Live Event SANS Salt Lake City 2017 Salt Lake City, UTUS Aug 14, 2017 - Aug 19, 2017 Live Event SANS Adelaide 2017 Adelaide, AU Aug 21, 2017 - Aug 26, 2017 Live Event SANS Virginia Beach 2017 Virginia Beach, VAUS Aug 21, 2017 - Sep 01, 2017 Live Event SANS Chicago 2017 Chicago, ILUS Aug 21, 2017 - Aug 26, 2017 Live Event SANS Tampa - Clearwater 2017 Clearwater, FLUS Sep 05, 2017 - Sep 10, 2017 Live Event SANS San Francisco Fall 2017 San Francisco, CAUS Sep 05, 2017 - Sep 10, 2017 Live Event SANS Network Security 2017 Las Vegas, NVUS Sep 10, 2017 - Sep 17, 2017 Live Event SANS Dublin 2017 Dublin, IE Sep 11, 2017 - Sep 16, 2017 Live Event SANS Minneapolis 2017 OnlineMNUS Jun 19, 2017 - Jun 24, 2017 Live Event SANS OnDemand Books & MP3s OnlyUS Anytime Self Paced
© Copyright 2026 Paperzz