top of page

ArcSight Log Files as Evidence

  • Writer: Pavan Raja
    Pavan Raja
  • Apr 8, 2025
  • 11 min read

Summary:

The provided information outlines several critical aspects related to managing information within organizations, particularly regarding compliance with legal requirements such as Sarbanes-Oxley Act and the management of electronic records and log files through ArcSight ESM (Enterprise Security Manager). Here's a summary of the key points discussed: 1. **Information Management Compliance**: The text highlights that ArcSight ESM is designed to manage computer security log files effectively, ensuring admissibility and credibility through secure communication channels and robust authentication techniques. This includes logging user access details and changes made, which supports the use of log file information as evidence in legal matters. 2. **Compliance with Sarbanes-Oxley Act**: The importance of compliance with laws such as Sarbanes-Oxley is emphasized, particularly Section 101(d) related to "Retention of Contracts and Records." This section must be met to retain records, which supports the legal framework for maintaining accurate financial reporting and accountability. 3. **Access Control and Information Security**: ArcSight ESM provides Access Control Lists (ACLs) that help in controlling access to private and confidential information according to organizational policies. Additionally, it offers customized workflows to ensure only authorized individuals have access during investigations, which is crucial for maintaining the security of sensitive data. 4. **Records Retention**: The system's ability to manage electronic records efficiently through tools like SmartStorage and the Database ensures that old or unnecessary information is disposed of in compliance with retention policies set forth by regulatory bodies such as Sarbanes-Oxley. 5. **Secure Transmission of Log Files**: Ensuring the integrity of log files for legal use involves secure transmission methods, which are crucial for maintaining the trustworthiness and admissibility of evidence in legal proceedings. 6. **Legal Compliance and Documentation**: The text refers to specific legal provisions including Public Law 106-229 (Sarbanes-Oxley Act) and mentions compliance conditions that must be met to retain records, which is a critical aspect for businesses operating within the regulatory framework of such laws. 7. **ArcSight ESM Features**: The text discusses ArcSight ESM's capabilities in managing electronic information securely, including its support for custom workflows, ACLs, and secure transmission protocols that align with legal requirements. 8. **Kahn Consulting Services**: Kahn Consulting Inc., a company specializing in addressing critical issues related to management programs, electronic records, and compliance audits, serves clients ranging from Fortune 500 companies to government agencies globally. Their expertise includes providing services for managing information security through tools like ArcSight ESM. 9. **Legal Disclaimer and Copyright**: The document ends with a legal disclaimer from Kahn Consulting Inc. and ArcSight, Inc., cautioning about potential errors or omissions in the provided information and emphasizing copyright compliance to prevent unauthorized reproduction. In summary, this text focuses on the technical aspects of managing sensitive electronic information within organizations, particularly how tools like ArcSight ESM help maintain compliance with legal requirements such as Sarbanes-Oxley Act. It underscores the importance of secure practices for handling log files and other records that may be used in legal proceedings.

Details:

The evaluation conducted by Kahn Consulting, Inc., for ArcSight's Enterprise Security Management (ESM) system highlights its capability to serve as a robust platform for managing computer security log files as evidence. This evaluation was commissioned by ArcSight and aims to assess the product's utility in collecting, analyzing, correlating, and generally managing electronic information related to cybersecurity incidents. The assessment of ArcSight ESM involved comparing its capabilities against legal and regulatory requirements and best practices associated with digital record management. The evaluation report emphasizes that an effective computer security log management system should be part of a broader, policy-driven program involving processes and technology. It underscores the importance of implementing centralized servers and storage for log data to ensure the protection and integrity of information collected by ArcSight ESM. The conclusion is based on the assessment that the product's design features support its use as a secure and trustworthy platform for managing cyber security logs, thereby facilitating effective incident response and compliance with legal standards. This evaluation serves as an important reference point for organizations considering adopting or evaluating similar systems to enhance their cybersecurity practices, highlighting the importance of comprehensive log management infrastructure in maintaining digital evidence integrity and supporting regulatory compliance efforts. The report focuses on ArcSight Enterprise Security Manager (ESM), a software designed for monitoring digital information security. It highlights how businesses increasingly rely on electronic transactions due to their convenience and potential risks associated with data security. Organizations have been enhancing their network infrastructure with various software and hardware solutions to safeguard digital assets, but several challenges arise in managing and utilizing this information effectively: 1. The volume of log files generated by multiple software applications and devices is growing, which can be crucial for evidential purposes. 2. Networks are becoming more distributed, leading to increased access points that require better management. 3. Systems are becoming more complex due to the rise in Service-Oriented Architectures (SOA), increasing interdependencies among systems. 4. Attacks from malicious parties have become more sophisticated, posing significant threats to data security. 5. There is a growing emphasis on information management and protection practices by regulatory bodies, which adds pressure to improve these practices. 6. Organizations face potential penalties for failing in their information management and protection efforts. 7. Lack of standardization in log file formats from different security systems complicates the integration and analysis of this data. Due to these challenges, organizations are turning to ArcSight ESM as a solution to better collect, process, and act on the information found in log files. The report emphasizes that this software can help manage risks associated with digital business operations by providing enhanced capabilities for monitoring, analyzing, and responding to potential threats more effectively. This report discusses ArcSight Enterprise Security Management (ESM), a software system designed to efficiently collect, monitor, analyze, and act on computer security log file information from various devices throughout an organization's network. It can ingest over 150 different types of security log files, intelligently correlate them, and present the information in a way that supports informed decision-making across multiple user communities. ArcSight ESM is pre-configured with default settings for security, processing, and reporting, but it is customizable to fit specific network design requirements and security priorities. The system maintains evidential quality by ensuring authorized access, management, and processing of data, secure storage and retrieval mechanisms, secure data transport, and retention policies for audit and legal purposes. The information flow in ArcSight ESM includes: 1) "ArcSight SmartConnectors" normalize, categorize, and securely transmit log file information to the "ArcSight Manager," with configurable transmission frequency. 2) The ArcSight Manager performs real-time correlation of threats and compliance violations detected from transmitted log file information. 3) The manager stores data in the "ArcSight Database." Data retention depends on user settings but is generally tailored for audit and legal purposes to maintain evidential quality. This text discusses ArcSight ESM (Enterprise Security Manager), a software system designed to manage security log files within an organization's network. Key features include customizable database settings that align with specific policies and compliance requirements, accessible reporting through web browsers via ArcSight Web, and administrative access available through the ArcSight Console interface on workstations. The text also highlights the increasing use of computer log files as legal evidence in various situations like internal investigations, lawsuits, government audits, etc. Organizations are advised to not only treat these logs as technical data but as crucial evidence that must be managed appropriately for future legal or regulatory use. The credibility and admissibility of such electronic information depend on how well it is stored, retrieved, and presented, which organizations must ensure when using computer security log files as evidence in various proceedings. The integration of electronic information into legal proceedings presents two main challenges: admissibility and credibility. Admissibility refers to whether the electronic information is acceptable to a court or regulator; while in most instances, there are no specific prohibitions on its admissibility, it must be credible, meaning authentic, complete, and trustworthy enough to influence the outcome of legal proceedings. The process known as normalization plays a crucial role in dealing with these challenges by converting log file information from various proprietary formats into a universal format that can be processed and analyzed by ArcSight ESM (Enterprise Security Manager). During this process, event data such as security event priority, time of occurrence, etc., is standardized into a common ArcSight ESM data schema. This standardization aims to reduce the volume of redundant or unnecessary information processed by reducing duplicates. However, it's important to note that altering log files during the normalization process can affect their evidential quality. It has been clarified through various laws and regulations that authentic electronic evidence is admissible; however, they also emphasize the importance of maintaining standards for integrity and accuracy. The courts have even excluded certain electronic evidences if deemed not credible or accurate enough to influence a legal proceeding. Therefore, while there may be no explicit prohibitions against admitting electronic information as evidence, its admissibility and credibility are crucial considerations that must be thoroughly evaluated and maintained throughout the process of being collected, processed, and utilized in court proceedings. The provided text discusses the importance of trustworthiness and integrity in computer security log file information within organizations when using ArcSight ESM (Advanced Security Event Manager) for product evaluation. It highlights that electronic information can be difficult to manage without altering its content, due to factors like media deterioration, software obsolescence, and environmental degradation. The text also mentions the foundational concept of "the original" in evidentiary statutes, which refers to documents or evidence unaltered from their initial form. Despite the infinite copies possible in electronic documents, laws and regulations accept that for evidentiary purposes, there may be no difference between an "original" and a "duplicate." The text concludes by discussing how organizations should consider these issues when evaluating the impact of normalization on the quality of log file information within ArcSight ESM. The ESIGN Act4 outlines specific conditions for using electronic information in legal contexts: it must accurately reflect the original contract or record, remain accessible for the required time period, be reproducible in the future, and if electronically recorded, can serve as an "original." ArcSight ESM's normalization process ensures that security event data from various systems is translated into a uniform format that preserves its meaning. This method of standardization not only enhances usability but also maintains the integrity of the original electronic record during processing. The Federal Rules of Evidence support this practice by acknowledging that if an organization consistently relies on a digital record in its operations, it generally qualifies as admissible evidence. Documenting and adhering to robust policies for software reliability and procedures are crucial factors in the credibility of such electronic records. ArcSight ESM is a system designed to manage and analyze log files in organizations, which are crucial for maintaining the accuracy and integrity of record keeping systems as mandated by several federal and state regulations. The documentation provided by ArcSight includes comprehensive details on auto-normalized methods for converting logs into a single standard format, enhancing analysis and ensuring quality assurance through testing procedures. The effectiveness of ArcSight ESM in managing log file information is heavily dependent on the accuracy and authenticity of source data across various devices within an enterprise. Different levels of protection are applied to different types of devices (e.g., laptops vs. web servers), which affects how much reliance organizations can place on specific log file information. ArcSight ESM supports a conservative evidentiary approach, allowing organizations to store raw, non-normalized logs either locally or in a separate location for potential future use as electronic evidence. However, it's important to consider the volume of such information generated by devices and decide whether to retain it on the device itself or elsewhere based on its retention period. The text discusses the importance of managing log files for computer security purposes, particularly when they need to serve as evidence in future legal proceedings. It highlights the practical need to move such data from devices to another storage location due to longer term retention requirements or evidentiary use. The document is part of a special report on evaluating ArcSight ESM, focusing on its capabilities related to access control and information management for log file security. ArcSight ESM features multiple user roles that determine levels of responsibility and access based on predefined roles such as Admin, Author, Operator, Analyst, Security Manager, and Business User. The system also supports Access Control Lists (ACLs) which help in controlling access to private and confidential information according to the organization's policies. Additionally, ArcSight ESM allows for customized workflows that can be programmed to ensure only authorized individuals have access to sensitive data during investigations. This text discusses several aspects related to managing information within organizations, including investigation workflow capabilities, records retention, and secure transmission of log file information. It emphasizes the importance of these practices in compliance with laws such as Sarbanes-Oxley Act. ArcSight ESM (Enterprise Security Manager) is mentioned as a tool that provides storage solutions like SmartStorage and the Database to manage electronic information efficiently and securely. The text also highlights the need for secure transmission of log files from security devices, ensuring their integrity for legal and regulatory use. ArcSight ESM (Enterprise Security Management) is designed to manage computer security log files effectively by ensuring admissibility and credibility through secure communication channels and robust authentication techniques. It provides comprehensive auditing capabilities, logging user access details and changes made, which supports the use of log file information as evidence in legal matters. Kahn Consulting believes that ArcSight ESM's design safeguards the integrity and trustworthiness of the data it handles by implementing protection measures and adhering to documented processes. Kahn Consulting Inc., based in Chicago, provides comprehensive services to address critical issues related to management programs, electronic records and email policies, Information Management Compliance audits, product assessments, legal and compliance research, education and training. The company serves Fortune 500 companies and government agencies globally. Some of its notable clients include International Paper, Dole Foods, Sun Life Financial, Time Warner Cable, Kodak, McDonald's Corp., Hewlett-Packard, United Health Group, the Federal Reserve Banks, Ameritech/SBC Communications, Prudential Financial, Motorola, Altria Group, Starbucks, Mutual of Omaha, Sony Corporation, and the Environmental Protection Agency. For more information about Kahn Consulting Inc., including its services and clients, visit www.KahnConsultingInc.com. The Special Report: Product Evaluation: ArcSight ESM discusses the engagement conducted by KCI with ArcSight. The evaluation was based on information supplied by ArcSight through internal and external documentation, interviews with ArcSight representatives, and does not include independent laboratory testing or field-testing of ArcSight products (1). It provides a list of supported devices for ArcSight ESM available at http://www.arcsight.com/product_supported.htm (2) and mentions compliance conditions in Rule 902 which must be met to retain records (3). The document refers to specific legal provisions including Public Law 106-229, Section 101(d), "Retention of Contracts and Records" (4-7), all of which are considered endnotes (8). This text seems to be related to legal and technical matters, possibly regarding the Sarbanes-Oxley Act and its implications for businesses. Here's a summary of what it says: 1. The document 9 IRS Revenue Procedure 97-22 provides specific guidance on certain aspects discussed under section (A) mentioned in square brackets. This suggests that there is information provided about the Sarbanes-Oxley Act, which includes details related to financial reporting and accountability regulations introduced by Congress to improve corporate governance standards. 2. For more detailed knowledge or reference regarding the Sarbanes-Oxley Act, a link to the SEC (Securities and Exchange Commission) official website is provided for further information at http://www.sec.gov/about/laws.shtml. This indicates that additional resources can be accessed through this official source of the U.S government agency responsible for regulating the securities industry in order to understand the Act better. 3. The text contains legal disclaimers from Kahn Consulting, Inc. (KCI) and ArcSight, Inc., warning about potential errors or omissions in the information provided within the document. It also highlights that reader's responsibility lies in selecting materials appropriately for desired results and that opinions may change without notice. 4. The contact details including a website address (www.KahnConsultingInc.com), email, phone number, and fax number are given at the end of the text, indicating how to get further assistance or information about Kahn Consulting, Inc., in case needed. This section emphasizes their commitment towards customer service by providing multiple communication channels for potential clients to reach out if they require any services or clarification related to this matter. 5. Finally, it is noted that all contents within this publication are copyrighted by Kahn Consulting, Inc. and ArcSight, Inc., indicating a clear ownership of the intellectual property contained in the document. Reproduction without prior written permission from these companies is strictly forbidden as stated at the end of the text.

Disclaimer:
The content in this post is for informational and educational purposes only. It may reference technologies, configurations, or products that are outdated or no longer supported. If there are any comments or feedback, kindly leave a message and will be responded.

Recent Posts

See All
Zeus Bot Use Case

Summary: "Zeus Bot Version 5.0" is a document detailing ArcSight's enhancements to its Zeus botnet detection capabilities within the...

 
 
 
Windows Unified Connector

Summary: The document "iServe_Demo_System_Usage_for_HP_ESP_Canada_Solution_Architects_v1.1" outlines specific deployment guidelines for...

 
 
 

Comments


@2021 Copyrights reserved.

bottom of page