Security Classifications
The following tables provide Security classification information. This table lists descriptions and examples.
Classification | Description | Examples Of |
---|---|---|
Compromise | Logs reporting on a successful system or network compromise. ** Seen more on Host Intrusion Detection Systems (HIDS) than network based detection mechanisms. ** |
|
Attack | Logs reporting on activity indicative of a system or network attack where it is either assumed to have been successful or cannot be assumed to have failed. Attack is known to have originated from a “Bad Guy” source. |
|
Denial of Service | Logs reporting on activity indicative a denial of service where it is assumed to have succeeded or cannot be assumed to have failed. |
|
Malware | Logs reporting on activity indicative of malware installation, propagation, or use. This classification is set to RR=9 because malware is indicative of complex control of systems within the environment possibly leading to data loss with malicious intent, theft, tampering, etc. |
|
Suspicious | Logs reporting on activity that is suspicious but not known to be an attack or unauthorized. |
|
Reconnaissance | Logs reporting on activity indicative of or directly indicating system or network reconnaissance. |
|
Misuse | Logs reporting on activity indicative of system or network misuse. |
|
Activity | Logs reporting on general system or network activity. |
|
Failed Attack | Logs reporting on attack activity that was not successful, possibly due to preventative measures. |
|
Failed Denial of Service | Logs reporting on denial of service activity that was not successful, possibly due to preventative measures. |
|
Failed Malware | Logs reporting on malware activity that was not successful, possibly due to preventative measures. |
|
Failed Suspicious | Logs reporting on suspicious activity that was not successful, possibly due to preventative measures. |
|
Failed Activity | Logs reporting on general system or network activity that was not successful, possibly due to preventative measures |
|
Other Security | Logs reporting on security activity not otherwise classifiable |
Security Classification Defaults
This table gives defaults for Risk Rating (RR), Event Forwarding, and LogMart Forwarding.
Classification | Default Risk Rating (RR)* | Default Event Forwarding** | Default LogMart Forwarding |
---|---|---|---|
Compromise | 9 | Forward All | Forward All |
Attack | 8 | Forward All | Forward All |
Denial of Service | 8 | Forward All | Forward All |
Malware | 9 | Forward All | Forward All |
Suspicious | 6 | Forward All | Forward All |
Reconnaissance | 4 | Forward All | Forward All |
Misuse | 5 | Forward All | Forward All |
Activity | 0 | Forward If | Forward Events |
Failed Attack | 0 | Forward None | Forward All |
Failed Denial of Service | 0 | Forward None | Forward All |
Failed Malware | 0 | Forward None | Forward All |
Failed Suspicious | 0 | Forward None | Forward All |
Failed Activity | 0 | Forward None | Forward None |
Other Security | 0 | Case by Case | Forward Events |
*This is the usual Risk Rating assigned to a Common Event associated with this classification. However, Risk Ratings will vary by Common Event within the same classification. This value is a general default, not strictly enforced.
**This is the default setting for forwarding the log to the Platform Manager assigned to a Common Event associated with this classification.