Practical Considerations for Selecting Targets

My Nokia smartphone drives me crazy alerting me to things that I don’t need to know, that I can’t do anything about, and that interfere with basic operations (such as making phone calls). One particularly annoying message, “Packet Data Started,” often appears just as I’m beginning to dial a number, forcing me to acknowledge the message and restart my number dialing. Nokia thoughtfully included this feature to keep users without unlimited data plans informed that their phone is about to incur data charges. In my case, I have no need to see the message, since I have an unlimited data plan.

Don’t configure your systems like my smartphone, collecting events for which you don’t intend to take action. If you’re able to fully monitor a system, but you can’t do anything about the events that are generated, why bother monitoring it? Event collection is always necessary to support investigations. Even when you’re not actively monitoring events, you must collect the events to support incident response. For targeted monitoring, however, events that you cannot mitigate are a distraction and should not be alerted. For example, Figure 4-6 shows an Oracle alert from a Security Information Manager (SIM) system.

Oracle Application Server alert

Figure 4-6. Oracle Application Server alert

This event seems to detail an attack against an Oracle application server. If you know that you’re not running Oracle application software, or that no one at the company can analyze the target systems for signs of attack or mitigate the problem, you’re wasting your time alerting about the event.

Political blockades are another source of frustration for security monitoring. Although the security team may do an excellent job discovering security problems, getting the support teams to address the problems may be politically infeasible. Don’t waste your time targeting such systems, if you can avoid it. Take peer-to-peer (P2P) software, for example. It’s relatively easy to detect, and you can likely track down the individuals using it on the corporate network (e.g., to download movies). If management and human resources are unwilling to enforce policies governing its use, however, there’s no benefit to tracking them down in the first place.



[38] Richard Beijtlich. Extrusion Detection (Addison-Wesley Professional, 2005).

Get Security Monitoring now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.