SecurityWarrior Consulting的Anton Chuvakin博士在去年底的时候写过一篇文章:Top 10 Things Your Log Management Vendor Won’t Tell You,很有意思。实际上,他提醒用户在选择日志审计产品,尤其是用它来做内控的目的的时候应该注意的问题。这些注意事项有助于帮助客户建立起合理的产品预期,也有助于督促日志审计/日志管理厂商去思考这些问题背后的解决方案。好吧,让我们大家都擦亮眼睛。
原文摘录如下:

While many people have seen the “Top 10 things that your chef, real-estate agent, wedding planner or pilot won’t tell you,” the world has not yet seen Top 10 things your log management vendor won’t tell you. Finally, this gap has been closed.

  • “We talk analytics, but really, most of our customers only use us for collection.” While some products within SIEM and log management offer advanced analytics features, many customers are not truly ready for them. They need to  start dealing with the basics—logging, log collection, log review—before delving into advanced areas. Buying a product based on features you won’t use is a mistake.
  • “Our tool won’t make you PCI compliant. You’d have to do A LOT of things yourself – every day – to get and maintain compliance.” Sadly, many security solutions—and SIEM / log management are no exception—are sometimes sold as “compliance in a box.” You need to be aware that to stay PCI compliant you need to do more than purchase tools.
  • “No, you cannot buy an entire SOC in this small box.” Just as with compliance, you cannot buy an entire Security Operations Center in a box, big or small. However, some will try to sell you their SIEM as “SOC-in-a-box.” Running an effective SOC includes multiple processes and procedures which are just as necessary as a market-leading SIEM tool.
  • “We are cloud-ready, because … mmmmm… well, we are ready for it!” Many vendors will tell you that their tools are cloud-ready – without really thinking about what they mean. Effectively monitoring traditional and multi-tenant cloud environments distributed across regions and countries requires more than updated marketing materials! As a customer, you will need to carefully test the tool in your own hybrid environment before concluding that it is “cloud ready.”
  • “Our SIEM is really just a renamed log management tool. But that’s all you probably need.” The confusion around SIEM and log management functionality rages on – it also allows some tools to be sold as SIEM without having any critical SIEM functionality such as correlation and real-time dashboards.  Even though it might be all many customers need, it does not make such tool a SIEM tool.
  • “We can do everything with logs, but it might require some SMALL customizations. Our PS team is standing by!” More than a few SIEM vendors will promise support for every possible log including logs they have never seen. However, fully integrating a new log source for reporting, correlation and visualization will always takes work and cannot be taken for granted.
  • “If you make a mistake with capacity planning, we’d be happy to sell you more log management than you really need.” Many organizations are having trouble estimating how much log data will be coming into their SIEM or log management tools.  Both underestimating and overestimating are common.  It is recommended that you spend about a week measuring log volumes across the systems that will be reporting to a SIEM.
  • “We think our tool is scalable, but we don’t really have production customers of your size. Our engineers believe that it might work.” Scalability claims are cheap and frequently made by SIEM and log management vendors. However, the only real proof that the tool will scale to your requirements is testing the tool in your environment. Thus, you should insist on performance testing during the pilot if there are any doubts.
  • “We estimate our performance using really small log message sizes.” Yes, our tools can do a million messages an instant – but these are our special messages that we create in the lab. Nowadays, application logs and the proliferation of XML-based logging has pushed message sizes up to 1 kb or more from the traditional 200 byte logs from firewalls.  Thus, you need to be wary of performance estimates based on such artificially short logs.
  • “Our tool offers predictive security intelligence. No, we don’t know what it means either – and we can’t really predict it.” SIEM is one of the most over-hyped and over-marketed security technologies out there. The only way to make sure that a particular tool will satisfy your requirements is too carefully spell out those requirements and then test the tool yourself.

读完这篇文章,我也是颇有体会。
的确,对于我接触到的目前国内大部分客户而言,使用日志审计/日志管理产品的主要用途就是收集日志,进行查询、统计和报表。关联分析几乎很少使用。一方面,关联分析功能是一个吃力难讨好的技术,要么就要做到满足用户期望80分以上,否则再做也没啥用。用户对于关联分析的期望往往较高,即要求分析能力强,又要求对普通管理员易用易懂。从技术层面来说,还有一段路要走,要看商业智能(Business Intelligence)技术发展到什么程度了。另一方面,即便有较强的关联分析功能,大部分用户也并不关注。对于他们而言,当前工作的重心还是在收集、存储、查询、统计上,因为这些功能对用户是切实有用的,是基本的功能点。我觉得这是当前LM产品的重点所在。实际上,即便是这些看似基本的功能点也隐藏着巨大的技术挑战。因为面对海量异构事件的收集、存储和查询,LM厂商们将必须将性能提升到一个用户可以接受的水平。

与Anton Chuvakin的观点差不多,我也认为对于用户而言,在考虑SOC之前最好先考虑SIEM,或者干脆先考虑LM。至少不要在考虑的SOC的同时忽略SIEM和LM。

既然对于用户而言,对于当前的日志审计/LM产品重点是考察收集、存储和查询统计,那么又如何去甄别各个厂商对此的宣传和技术参数呢?例如,最重要的一个技术参数叫做EPS(Event per Second),亦即每秒事件数。实际上,各个厂商在给出这个值的时候,其条件和内涵可能完全不同。首先,你需要知道这个值是在什么条件下获得的,至少要知道是什么CPU、多少内存、多少硬件资源的条件下获得的;可能的话,还要知道测试的基准日志源是什么样的,这些日志是单设备日志,还是多源日志,平均日志长度是多少?除此之外,你还需要知道EPS的内涵所指为何?是单纯收集上来的EPS?还是指收集上来且归一化后的EPS?抑或是收集上来、归一化并持久化存储后的EPS。内涵不同,LM产品的工作机制不同,进行EPS的数值比较可能没有什么意义。而往往,几乎不会有厂商主动告诉你这些。如果你比较Care这些,最好的方式是建立自己的测试基准,进行横向实际测试比较。所以,对于重要的客户,我比较强调PoC。

用户必须清楚的认识到,LM是一类管理系统,其运用必须遵循管理类系统的生命周期。简单的说,无论厂商如何说LM,用户都是清楚认识到实施LM的工作内容,并且这些工作有很多是你必须参与其中,无法逃脱的。例如,我们在上LM的时候,应该了解到日志源种类和类型、规划日志容量、设计查询统计模板,同时,配套的运维也需要建立起来。别幻想一听完厂商的产品介绍就认为有了这个产品一切都OK了。

转载于:https://blog.51cto.com/yepeng/570955

Anton Chuvakin:关于日志管理产品的十个注意事项相关推荐

  1. 客户资源信息管理后台/机构管理/信息管理/商机管理/产品管理/合同管理/日志管理/预约管理/任务清单/员工管理/资料库管理/统计分析/用户管理/售后日志/系统配置/crm客户管理系统/系统对接管理

    Axure作品介绍:客户资源信息管理后台/机构管理/信息管理/商机管理/产品管理/合同管理/日志管理/预约管理/任务清单/员工管理/资料库管理/统计分析/用户管理/售后日志/系统配置/crm客户管理系 ...

  2. 上网行为管理产品选型简单考量

    信息化浪潮汹涌向前,人们的生活.工作.学习越来越离不开IT,离不开网络. 对于很多组织来讲,网络就意味着效率.甚至生产力,协同办公.决策.科研.资金划拨等等都对网络有了前所未有的依赖.网络应用日益复杂 ...

  3. 《日志管理与分析权威指南》一2.3 良好日志记录的标准

    本节书摘来华章计算机<日志管理与分析权威指南>一书中的第2章 ,第2.3节,(美) Anton A. Chuvakin Kevin J. Schmidt Christopher Phill ...

  4. 《日志管理与分析权威指南》一1.6 人、过程和技术

    本节书摘来华章计算机<日志管理与分析权威指南>一书中的第1章 ,第1.6节,(美) Anton A. Chuvakin Kevin J. Schmidt Christopher Phill ...

  5. 一文读懂开源日志管理方案 ELK 和 EFK 的区别

    公众号关注 「奇妙的 Linux 世界」 设为「星标」,每天带你玩转 Linux ! 前言 主流的 ELK (Elasticsearch, Logstash, Kibana) 目前已经转变为 EFK ...

  6. 上网行为管理产品选型简述

    信息化浪潮汹涌向前,人们的生活.工作.学习越来越离不开IT,离不开网络. 对于很多组织来讲,网络就意味着效率.甚至生产力,协同办公.决策.科研.资金划拨等等都对网络有了前所未有的依赖.网络应用日益复杂 ...

  7. 日志管理最佳实践:成功的六要诀【解读版】

    合适的日志管理工具能够大幅减轻管理企业系统日志数据的负担.但是,除非组织为这个工具投入必要的时间和精力,否则再好的工具也会很快变成一个差劲的工具.Diana Kelley为大家提供了6个确保成功的日志 ...

  8. SANS:2012年度日志管理调查报告

    2012年5月初,SANS发布了2012年度的第八次日志与事件管理调查报告.本次调查的受访对象超过了600名专业人士,涵盖了各行各业,超过一半来自大中型企业. 调查问题1:收集日志的原因是什么? 结果 ...

  9. 日志审计产品(转载)

    由于业务需要,在网上粗略整理了一些日志审计系统: 安恒明御 天融信网络卫士 网御神州SecFox-LA Manageengine -Event Analyzer 分类 安恒明御 天融信网络卫士 网御神 ...

最新文章

  1. Collection集合List、Set
  2. fsl线性配准实践+核磁共振影像数据处理
  3. JS基础篇--HTML DOM classList 属性
  4. django Error: [Errno 10013]
  5. python 语音识别接口_python实现阿里云语音识别api
  6. hdoj 3376,2686 Matrix Again 【最小费用最大流】
  7. C语言学习—进制之间相互转换
  8. 阿里iconfont图标的使用教程
  9. gis合并dem数据_arcgis如何制作DEM数据
  10. zabbix报错gd、freetype、png、jpeg
  11. feign+hystrix相关超时时间配置问题
  12. 不是吧!你还在手动拉窗帘?
  13. Android 消息机制(Handler运行机制)
  14. CAS机制以及简单实现
  15. CSS文件引入另一个CSS文件
  16. 【2020-MOOC-浙江大学-陈越、何钦铭-数据结构】春期中考试(附每一个题目的详细解析)
  17. MXNet 定义新激活函数(Custom new activation function)
  18. 开源作品——CMSIS-DAP调试器
  19. AFX_EXT_CLASS
  20. 什么叫云原生应用?| 技术头条

热门文章

  1. html类名定义规则_HTML入门笔记1
  2. 计算机网络【一】概述+OSI参考模型
  3. 关于C++子类父类成员函数的覆盖和隐藏
  4. LeetCode2:Add Two Numbers
  5. java招聘职位描述,附学习笔记+面试整理+进阶书籍
  6. 系统盘点Android开发者必须掌握的知识点,含小米、腾讯、阿里
  7. access ole 对象 最大长度_Redis 数据结构和对象系统,有这 12 张图就够了!
  8. 给定有权无向图的邻接矩阵如下,求其最小生成树的总权重,代码。
  9. JDBC 数据库连接操作——实习第三天
  10. Android Studio开发第四篇版本管理Git(下)