How-To Guides
Configuration Guides

Configure Tamper-Proof Logging

8min

Any log records stored in a database can be changed by a malicious user with access to that database. To capture these changes, and understand if any log record has been tampered with or not, a tamper-proof mechanism is available in Kron PAM.

The Tamper Proof feature prevents unauthorized access to the database and the modification of any logs. All log types are stored and hashed in the database as encrypted binary data. This hashing mechanism is used to secure any changes to the database.

The SHA-256 algorithm is used in Kron PAM for hashing purposes. Each record type is hashed with a hash value and encrypted with a customer key (the hash value and hash date of each record type are stored in the database). In the event a hash value or any other information is changed in the log record by a malicious user, the newly generated hash value will not match the previous one, thanks to the encryption key. Using this algorithm the system recognizes if any log record is in its original state or has been tampered with.



Configuring Tamper Proof

Tamper Proof is set as a parameter and is enabled by default. When this parameter is enabled, the batch process is set as hashing. If Tamper Proof is disabled, the batch process will not be executed.

  1. Navigate to Administration > System Config Man.
  2. Add the tamper.proof.enabled parameter, and set the parameter value as true or false to enable or disable it.
Document image

  1. Navigate to AdministrationJob Scheduler.
  2. Set the Tamper Proof Log Job parameters. By setting this job, the logs will be hashed in the background. This job can be set periodically or triggered manually.
Document image


Checking if Logs Are Tamper-Proof

You can review logs' tamper-proof status from Session Logs, HTTP Proxy Logs, Activity Logs, Command Logs, Authentication Logs, Event Logs, or Video Logs.

  1. Navigate to Logging > User Auth Logs.
  2. Check the Show Tamper Proof Status box and enter other fields as you require to filter the logs.
Document image

  1. Click the Search button to display all the results on the screen.
  2. See the final column in the Search Results section, as it shows logs' tamper-proof status:
    • If the log record is tagged as Original, no modification has been made.
    • If the log record is tagged as Tampered, some log record information on the database, such as on name, time, client IP, hash info etc., has somehow been changed by a malicious user.
    • If the log record is tagged as Unknown, it has still not been hashed by the batch process. Once it is hashed in the background, the status will change to Original or Tampered.
User Auth Logs Screen with Show Tamper Proof Filter
User Auth Logs Screen with Show Tamper Proof Filter

User Auth Logs with/without Modifications
User Auth Logs with/without Modifications


Checking Activity Log to See if Users Searched for Tamper-Proof Logs

When a user searches for logs in tamper-proof status, this operation is recorded as an activity log.

To search for such activity:

  1. Navigate to Logging > Activity Logs
  2. Select the /log/activity-log/search-tamper-proof/ parameter as the Event Type.
Document image

  • Click Search to see the following results: a) Users who searched for the tamper-proof records, b) Time, c) Instance Name, d) Event Type, and e) Event Parameters
Document image