WAS v8.5 > Secure applications > Secure Service integration

Auditing the service integration security infrastructure

Security auditing is an important part of the security infrastructure. Security auditing provides a mechanism for auditable events to be tracked and archived while ensuring the integrity of the records.

Before enabling the security auditing subsystem for service integration, enable global security in the environment.

The primary responsibility of the security infrastructure is to prevent unauthorized usage of resources. Security auditing has two primary goals:

Security auditing achieves these goals by providing an infrastructure used to implement your code to capture and store supported security auditable events. All code other than the Java enterprise application code is considered to be trusted. Each time an enterprise application accesses a resource, any internal application server process that has audit points that are added within their code can be recorded as an auditable event. The security auditing subsystem captures the following types of auditable events:

These types of events can be recorded into audit log files. The audit log flies can be signed and encrypted to ensure data integrity. These audit log files can be analyzed to discover breaches over the existing security mechanisms and to discover potential weaknesses in the current security infrastructure. Security event audit records are also useful for providing evidence, accountability, and vulnerability analysis. The security auditing configuration provides four default filters, a default audit service provider, and a default event factory. This following steps describe how to customize your security auditing subsystem. Additional information specific to messaging is included in the step description where appropriate.

  1. Enable the security auditing subsystem

    Security auditing is not performed unless the audit security subsystem has been enabled. Global security must be enabled for the security audit subsystem to function, as no security events occur if global security is not also enabled.

    To allow messaging security events to be audited, audit security must be enabled:

    1. For each bus to be audited, click Service integration -> Buses -> security_value, and select the Enable the auditing service for this bus check box.

    2. For publish/subscribe messaging, also on each topic space on the bus being audited, click Service integration -> Buses -> bus_name -> [Destination resources] Destinations -> topic_space_name, and select the Enable the auditing service for this topic space check box.

  2. Auditor role

    A user with the auditor role is required to enable and configure the security auditing subsystem. It is important to require strict access control for security policy management. The auditor role provides granularity to support separation of the auditing role from the authority of the administrator.

  3. Create security auditing event type filters

    We can configure event type filters to only record a specific subset of auditable event types in your audit logs. Filtering the event types that are recorded makes for simpler analysis of your audit records by ensuring the records to only display what you selected as important for the an environment.

    The audit events that can be configured for messaging are:

    SECURITY_AUTHN

    This event is produced when the identity of a messaging client or messaging engine connecting to a messaging bus is authenticated.

    SECURITY_AUTHZ

    This event is produced when the identity of a messaging client is checked for access authority to a bus or a message queue when sending, directly or by publication, or receiving messages, directly or by subscription.

    SECURITY_AUTHN_TERMINATE

    This event is produced when the connection between a messaging client or messaging engine and a messaging bus is terminated.

    SECURITY_MGMT_CONFIG

    This event is produced when a messaging client changes the contents of a SDO repository in an import or remove operation.

    We can create event filters for each permutation of an event and its possible outcomes such as SUCCESS, DENIED, or error conditions of different levels of severity.

    See messaging security events for more information on which messaging security audit events are produced and when they are produced.

  4. Configure audit service providers for security auditing

    The audit service provider is used to format the audit data object that is passed to it before outputting the data to a repository.

  5. Configure audit event factories for security auditing

    The audit event factory gathers the data associated with the auditable events and creates an audit data object. The audit data object is then sent to the audit service provider to be formatted and recorded to the repository.

  6. Protecting your security audit data
    It is important for the recorded audit data to be both secured and with the data integrity ensured. To ensure that access to the data is restricted and secure, we can encrypt and sign your audit data.
  7. Configure security audit subsystem failure notifications

    We can enable notifications to generate alerts when the security auditing subsystem experiences a failure. Notifications can be configured to record an alert in the audit logs or can be configured to send an alert through email to a specified list of recipients.


Results

After successfully completing this task, you audit data is recorded for the selected auditable events that were specified in the configuration.

After configuring security auditing, we can analyze your audit data for potential weaknesses in the current security infrastructure and to discover security breaches that might have occurred over the existing security mechanisms.


Related


Enable the security auditing subsystem
Create security auditing event type filters
Configure security audit subsystem failure notifications
Configure the default audit service providers for security auditing
Configure audit event factories for security auditing
Protecting your security audit data
Configure security auditing using scripting
Tasks: Securing resources


Reference:

Administrative roles


+

Search Tips   |   Advanced Search