From the course: CompTIA Security+ (SY0-701) Cert Prep
File integrity monitoring
From the course: CompTIA Security+ (SY0-701) Cert Prep
File integrity monitoring
- [Instructor] File integrity monitoring is an important component of a defense-in-depth approach to cybersecurity. We have many different defenses designed to keep our endpoint systems safe. Antivirus software is designed to detect malicious files before they gain a foothold on endpoints. Centralized multifactor authentication prevents attempts to compromise user accounts. Host intrusion detection and prevention systems alert us to potential compromises and sometimes even block them. However, the principle of defense-in-depth suggests that we should have controls in place that can help us detect an intrusion even when those other systems fail. File integrity monitoring is a great example of this type of control. File integrity monitoring systems watch the file system of an endpoint or server for any unexpected changes and then report those changes to an administrator for further investigation. They perform this function by using cryptographic hash functions. Hash functions take an input of any size and transform it into a unique cryptographic hash value. File integrity monitoring systems run every monitored file through a cryptographic hash function and then store the resulting hash in a secure location. They then run the same checks on a periodic basis and compare the new hash values to the old hash values. If the hash changed, the integrity monitoring software knows that the file has changed and can then check its own configuration to see if that change was expected. Administrators of file integrity monitoring systems do need to perform some configuration to help the system determine what changes are expected and which are not. For example, you would certainly expect log files to change regularly on a computer system. If the file integrity monitor alerted each time a new log entry appeared in the file, you'd go nuts and turn it off. However, it would be noteworthy if a log file disappeared or shrank. On the other hand, if some of the core operating system executables change, that could be an indication of a malware infection and should be investigated carefully. File integrity monitoring often comes into an organization as a compliance requirement. For example, the payment card industry data security standard contains a clear requirement for using this technology. You can see here how that plays out in PCI DSS Requirement 11.5. Other organizations may find that their industry-specific regulations or audit requirements demand this type of monitoring. Let's take a look at a file integrity monitoring system in action. I'm here on a Linux server that's running the open source version of Tripwire, a package that implements file integrity monitoring. I'm going to go ahead and run a Tripwire check using the tripwire command with the --check option. Tripwire then scans the file system looking for changes that violate its security policy. And as you can see here, this summary report tells me that there were no violations. This means that none of the monitored files have changed since the last time that I updated the Tripwire database. Now let's go ahead and force a violation. I'm going to go ahead and edit the etc hosts allow file, and I'm just going to add a line to the end of the file for all systems. Let's go ahead and save that file. And now I'm going to rerun the Tripwire --check. I happen to know that the hosts that allow file is one of the files that Tripwire is monitoring on this system. So we run this check, we should see a violation because of that change that we just made. And now we see two violations. The etc directory was modified when I updated this file, and then the etc hosts allow file was modified. File integrity monitoring systems play an important role in a defense-in-depth approach to information security, often serving as the last line of defense against particularly tricky attacks.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
The goals of information security2m 11s
-
Authentication, authorization, and accounting (AAA)3m 31s
-
Categorizing security controls5m 11s
-
Conducting a gap analysis2m 34s
-
Zero Trust5m 32s
-
Physical access control4m 40s
-
Physical security personnel2m 12s
-
Deception technologies2m 55s
-
Change management6m 2s
-
-
-
Trust models2m 52s
-
PKI and digital certificates4m 5s
-
Hash functions7m 38s
-
Digital signatures3m 50s
-
Digital signature standard1m 27s
-
Create a digital certificate4m 55s
-
Revoke a digital certificate1m 28s
-
Certificate stapling2m 29s
-
Certificate authorities6m 13s
-
Certificate subjects3m 35s
-
Certificate types2m 55s
-
Certificate formats2m 30s
-
-
-
Preventing SQL injection4m 25s
-
Understanding cross-site scripting3m 17s
-
Request forgery4m 8s
-
Overflow attacks3m 21s
-
Explaining cookies and attachments4m 7s
-
Session hijacking4m 8s
-
Code execution attacks2m 43s
-
Privilege escalation1m 56s
-
OWASP Top Ten4m 45s
-
Application security4m 3s
-
Defending against directory traversal3m 4s
-
Race condition vulnerabilities2m 13s
-
-
-
Restricting network access2m 8s
-
Network access control4m 30s
-
Router configuration security4m 5s
-
Switch configuration security3m 42s
-
Maintaining network availability2m 32s
-
Network monitoring3m 41s
-
SNMP2m 54s
-
Isolating sensitive systems2m
-
Zero trust networking4m 9s
-
Secure access service edge (SASE)3m 50s
-
-
-
Operating system security8m 44s
-
Malware prevention7m 25s
-
Application management3m 46s
-
Host-based network security controls7m 44s
-
File integrity monitoring4m 9s
-
Data loss prevention5m 17s
-
Data encryption5m 39s
-
Hardware and firmware security5m 24s
-
Linux file permissions4m 2s
-
Web content filtering1m 47s
-
-
-
What is vulnerability management?5m 2s
-
Identify scan targets4m 24s
-
Scan configuration5m 20s
-
Scan perspective4m 24s
-
Security Content Automation Protocol (SCAP)2m 27s
-
Common Vulnerability Scoring System (CVSS )3m 31s
-
Analyzing scan reports4m 37s
-
Correlating scan results2m 20s
-
Vulnerability response and remediation2m 14s
-
-
-
Authentication factors3m 26s
-
Multifactor authentication2m 17s
-
Something you have4m 24s
-
Password policy4m 19s
-
Password managers2m 3s
-
Passwordless authentication3m 23s
-
Single sign-on and federation3m 9s
-
Kerberos and LDAP5m 18s
-
SAML2m 35s
-
OAUTH and OpenID Connect2m 55s
-
Certificate-based authentication5m 25s
-