10
Lottery Log Management: Reviewing Gaming System Logs Why, What, and How

Lottery Log Management: Reviewing Gaming System Logs Why, What, and How

Embed Size (px)

Citation preview

Page 1: Lottery Log Management: Reviewing Gaming System Logs Why, What, and How

Lottery Log Management:Reviewing Gaming System Logs

Why, What, and How

Page 2: Lottery Log Management: Reviewing Gaming System Logs Why, What, and How

©2009 Delehanty Consulting LLC

Why You Should Review

• Keep you and your director from getting fired!

• Consistent with business objectives

Page 3: Lottery Log Management: Reviewing Gaming System Logs Why, What, and How

©2009 Delehanty Consulting LLC

Every Standard Says You Should!(Do you want to explain why you weren’t?)

• NIST 800-92 Guide to Computer Security Log Management

• ISO 27002/17799 Code of practice for information security management

• COBIT 4 Control Objectives for Information & Technology

• NIST 800-53 Recommended Security Controls for Federal Information Systems

Page 4: Lottery Log Management: Reviewing Gaming System Logs Why, What, and How

©2009 Delehanty Consulting LLC

Lottery’s Log Management Business Objectives

1. Security Operations: Security policies and systems are operating as planned

2. IT Operations: Determine whether IT operations can be improved and whether they are susceptible to issues

3. Forensics: Capture admissible proof that could serve as evidence if harm was done or rules/policies were intentionally broken

Page 5: Lottery Log Management: Reviewing Gaming System Logs Why, What, and How

©2009 Delehanty Consulting LLC

Analyze What?

• SANS – Top 5 Essential Log Analyses

• NIST SP 800-92 Guide to Computer Security Log Management (consistent with ISO 17799/27002)

Page 6: Lottery Log Management: Reviewing Gaming System Logs Why, What, and How

©2009 Delehanty Consulting LLC

SANS Essential Log Analyses

1. Attempts to access through existing accounts

2. Failed file or resource access attempts

3. Unauthorized changes to groups, users, etc.

4. Suspicious/unauthorized network traffic

Page 7: Lottery Log Management: Reviewing Gaming System Logs Why, What, and How

©2009 Delehanty Consulting LLC

NIST Additions

• Transaction information

• Significant Operational Actions – Application startup and shutdown– Task execution– Application failures.

Page 8: Lottery Log Management: Reviewing Gaming System Logs Why, What, and How

©2009 Delehanty Consulting LLC

Transaction Information

• All transactions should be written to a master transaction file that cannot be altered prior to being received by the Lottery

• Requirement met by:– Transaction Master File– ICS system

• Better source for forensic evidence than Gware

Page 9: Lottery Log Management: Reviewing Gaming System Logs Why, What, and How

©2009 Delehanty Consulting LLC

HowActivity Analysis Strategies

1. Review all activities and processes

2. Focus on high-risk activities

3. Focus on high-risk processes

4. Develop baselines and then look for anomalies

5. Time sampling or all days

6. All systems, select systems, or sampling

Page 10: Lottery Log Management: Reviewing Gaming System Logs Why, What, and How

How – A Process ApproachYou’re First Log Review

• High risk

• Daily review

• All gaming systems

• Handout leads you through process

©2009 Delehanty Consulting LLC