Special Publication 800-92
Guide to Computer Security
Log Management
Recommendations of the National Institute
of Standards and Technology
Karen Kent
Murugiah Souppaya
GUIDE TO COMPUTER SECURITY LOG MANAGEMENT
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology
(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s
measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of
concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of
sensitive unclassified information in Federal computer systems. This Special Publication 800-series
reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations.
Certain commercial entities, equipment, or materials may be identified in this
document in order to describe an experimental procedure or concept adequately.
Such identification is not intended to imply recommendation or endorsement by the
National Institute of Standards and Technology, nor is it intended to imply that the
entities, materials, or equipment are n ecessarily the best available for the purpose. National Institute of Standards and Technolo gy Special Publication 800-92
Natl. Inst. Stand. Technol. Spec. Publ. 800-92, 72 pages (September 2006)
iiGUIDE TO COMPUTER SECURITY LOG MANAGEMENT
Acknowledgements
The authors, Karen Kent and Murugiah Souppaya of the National Institute of Standards and Technology
(NIST), wish to thank their colleagues who reviewed drafts of this document and contributed to its
technical content, especially Bill Burr, Elizabeth Chew, Tim Grance, Bill MacGregor, Stephen Quinn, and Matthew Scholl of NIST, and Stephen Green, Joseph Nusbaum, Angela Orebaugh, Dennis Pickett,
and Steven Sharma of Booz Allen Hamilton. The authors particularly want to thank Anton Chuvakin of
LogLogic and Michael Gerdes for their careful review and many contributions to improving the quality of this publication. The authors would also like to express their thanks to security experts Kurt D illard of
Microsoft, Dean Farrington of Wells Fargo Bank, Raffael Marty of ArcSight, Greg Shipley of Neohapsis, and Randy Smith of the Monterey Technology Group, as well as representatives from the Department of Energy, the Department of Health and Human Services, the Department of Homeland Security, the Department of State, the Department of Treasury, the Environmental Protection Agency, the National
Institutes of Health, and the Social Security Administration, for their valuable comments and suggestions.
Trademarks
All names are registered trademarks or trademarks of their respective companies.
iiiGUIDE TO COMPUTER SECURITY LOG MANAGEMENT
Table of Contents
Executive Summary............................................................................................................ES -1
1. Introduc tion ................................................................................................................... 1-1
1.1 Authority................................................................................................................ 1-1
1.2 Purpose and Scope............................................................................................... 1-1
1.3 Audience ............................................................................................................... 1-1
1.4 Publication Structure ............................................................................................. 1-1
2. Intr
NIST.SP.800-92 Guide to Computer Security Log Management
文档预览
中文文档
72 页
50 下载
1000 浏览
0 评论
0 收藏
3.0分
温馨提示:本文档共72页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
本文档由 思安 于 2022-12-05 09:16:33上传分享