Sending logs to MozDef¶
Events/Logs are accepted as json over http(s) with the POST or PUT methods or over rabbit-mq. Most modern log shippers support json output. MozDef is tested with support for:
We have some configuration snippets
What should I log?¶
If your program doesn’t log anything it doesn’t exist. If it logs everything that happens it becomes like the proverbial boy who cried wolf. There is a fine line between logging too little and too much but here is some guidance on key events that should be logged and in what detail.
|Authentication Events||Failed/Success logins||Authentication is always an important event to log as it establishes traceability for later events and allows correlation of user actions across systems.|
|Authorization Events||Failed attempts to insert/update/delete a record or access a section of an application.||Once a user is authenticated they usually obtain certain permissions. Logging when a user’s permissions do not allow them to perform a function helps troubleshooting and can also be helpful when investigating security events.|
|Account Lifecycle||Account creation/deletion/update||Adding, removing or changing accounts are often the first steps an attacker performs when entering a system.|
|Password/Key Events||Password changed, expired, reset. Key expired, changed, reset.||If your application takes on the responsibility of storing a user’s password (instead of using a centralized source) it is important to note changes to a users credentials or crypto keys.|
|Account Activations||Account lock, unlock, disable, enable||If your application locks out users after failed login attempts or allows for accounts to be inactivated, logging these events can assist in troubleshooting access issues.|
|Application Exceptions||Invalid input, fatal errors, known bad things||
If your application catches errors like invalid input attempts on web forms, failures of key components, etc creating a log record when these events occur can help in troubleshooting and tracking security patterns across applications. Full stack traces should be avoided however as the signal to noise ratio is often overwhelming.
It is also preferable to send a single event rather than a multitude of events if it is possible for your application to correlate a significant exception.
For example, some systems are notorious for sending a connection event with source IP, then sending an authentication event with a session ID then later sending an event for invalid input that doesn’t include source IP or session ID or username. Correctly correlating these events across time is much more difficult than just logging all pieces of information if it is available.