Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • The Five Stages of File Integrity Monitoring (FIM)
  • Critical Vulnerability
  • Data Breach

The Five Stages of File Integrity Monitoring (FIM)

4 years ago Mitch Parker
The Five Stages of File Integrity Monitoring (FIM)

The benefits of a capable and properly deployed File Integrity Monitoring (FIM) solution are plentiful:

  • If you see unexpected or unexplained file changes, you can investigate immediately and resolve the issue quickly if your system has been compromised.
  • You can reconcile changes against change tickets or a list of approved changes in a text file or spreadsheet.
  • You can determine if changes take configurations out of policy (impact hardening standard).
  • You can automate responses to specific types of changes—for example, flag the appearance of a DLL file (high-risk) but auto-promote a simple modification to a DLL file (low-risk).

And the importance of FIM cannot be understated. Let’s not forgot what the Center for Internet Security (CIS) says in its Distribution Independent Linux Benchmark version 2.0.0:

“Use file integrity checking tools to ensure that critical system files (including sensitive system and application executables, libraries, and configurations) have not been altered. The reporting system should: have the ability to account for routine and expected changes; highlight and alert on unusual or unexpected alterations; show the history of configuration changes over time and identify who made the change (including the original logged-in account in the event of a user ID switch, such as with the su or sudo command). These integrity checks should identify suspicious system alterations such as: owner and permissions changes to files or directories; the use of alternate data streams which could be used to hide malicious activities; and the introduction of extra files into key system areas (which could indicate malicious payloads left by attackers or additional files inappropriately added during batch distribution processes).”

The Value Provided by FIM

Let’s face it, File Integrity Monitoring (FIM) can be “noisy” and a large time commitment if you let it get out of control. With a well-chosen solution, light care and feeding, along with tuning to match environment changes, you can keep the Five Stages of FIM from overburdening your resources.

Let’s simplify (or look FIM for what value it provides to an organization):

  1. Something in your monitored environment changed.
  2. Something changed, and it was unexpected.
  3. Something changed, it was unexpected, and it was bad.
  4. Something changed, it was unexpected, it was bad, and here’s how to get back to the known and trusted state.
  5. Something changed, it was unexpected, it was bad, here’s how to fix it, and let’s tune our solution to minimize noise in the future.

If you have no solution, or if your solution doesn’t help you quickly address these changes, it’s easy to understand how FIM can act like “the one that got away.”

One of the most important things you can do to advance FIM in your organization is to narrow its scope to the use cases that solve compliance, security, and operational problems. Probably in that order. And probably starting with the five opportunities/levels of complexity above.

A good example is SOX compliance where the organization has “locations” involved in producing SOX-related content. Those may be files, directories, applications, or even database fields. But NOT all files or all directories or all applications.

Organizations on the more mature side of FIM will say, “We have 135 locations associated with SOX data that could be audit points. We need to know what changes happened, including a baseline, to ensure there was not malfeasance in the creation of our financial reports in those (very specific) places.”

Realizing FIM with Tripwire ExpertOps

Organizations purchase FIM solutions for a few different reasons. Some are looking for an inexpensive “checkbox” solution to show due diligence against legal action, while others are concerned about the impact of change on operational uptime.

In our option at Tripwire, we help our clients to take advantage of everything that FIM has to offer through the delivery of a specific service that addresses the varied use of use cases for file integrity monitoring. We call this service “ExpertOperations” or “ExpertOps” for short.

In a nutshell, customers get a dedicated managed services engineer who can work under different tiers of service, delivering everything from standard Tripwire reports to full integration with their Security Information and Event Management solution as well as tying into their change management solution and more.

Our Tripwire experts who run and manage this service are dedicated to addressing customers’ specific needs, and they are with them in partnership to make their projects successful over time.

By recognizing the value of FIM, focusing your efforts where you MUST and WANT to, as well as narrowing your horizon to the critical few, you too can reap the advantages of FIM in your organization.

Learn more about Tripwire’s FIM solutions here.

The post ” The Five Stages of File Integrity Monitoring (FIM)” appeared first on TripWire

Source:TripWire – Mitch Parker

Tags: Critical Severity, High Severity, Linux, Low Severity, TripWire

Continue Reading

Previous The Continuing Threat of Unpatched Security Vulnerabilities
Next Critical “Access:7” Supply Chain Vulnerabilities Impact ATMs, Medical and IoT Devices

More Stories

  • Cyber Attacks
  • Data Breach

LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

6 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

9 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

12 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks

12 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

12 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns

16 hours ago [email protected] (The Hacker News)

Recent Posts

  • LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace
  • GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data
  • The Kill Chain Is Obsolete When Your AI Agent Is the Threat
  • Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
  • Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT