Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security | Event Logging for Auditing #150

Open
ruffsl opened this issue Sep 19, 2017 · 3 comments
Open

Security | Event Logging for Auditing #150

ruffsl opened this issue Sep 19, 2017 · 3 comments
Labels
enhancement New feature or request

Comments

@ruffsl
Copy link
Member

ruffsl commented Sep 19, 2017

This issue serves to track ideas for specifying the security event logging to be used in SROS2. Ideally this specification should be extensive enough to enable security monitoring and auditing frameworks. In particular this will be critical for auto generation of policies, or learning security profiles by demonstration. In anticipation that ROS2 will enable larger and more elaborate computation graphs; auditing and constructing complete policies manually for such networks at scale will not only be tedious for users and thus inhibit security adoption, but would be error prone as well due to the evolved human factors. Given that ROS2 is also decentralized, there is no longer an opportunity to monitor events from a central arbiter, as first approached in SROS1. This necessitates that SROS2 should define security logging mechanisms, either through dedicated topic channels or local disk storage, to provide the foundation enabling higher level automated security tooling.

Additionally, it would be advantageous if the standard translated easily to logging structured used by other secure middleware transports (i.e., DDS Secure's builtin plugins), but is not necessarily too ingrained to inhibit being a common format among transports vinders. Much of this issue may be also contingent upon the design decisions for application logging for in ROS2 in general.

Some ideal qualities for such a format may also include:

  • human readable
    • format should be clear and concise
    • otherwise may prove difficult to audit or debug
  • machine parsable
    • consumable for metafile auto generation
    • importing and exporting should preserve original structure
  • expressive power
    • suitable for defining all SROS2 security exchanges
    • capable of extension for future security transport plugins

Additional, there are some aspects of the standard we may wish to decide on as well:

  • file format
    • what file format encoding should be used (e.g., ASCII, Binary, other)
  • logging level
    • supported logging levels and what would the denonte (e.g., ERROR, WARNING, DEBUG, etc.)
  • templating
    • what template format should be followed for reliable parsing (e.g., CLF, syslog, ROS1, other)
@clalancette
Copy link
Contributor

@ruffsl @mikaelarguedas Is the design document for this something we expect to target for bouncy, or is it a long-term task?

@clalancette clalancette added the enhancement New feature or request label Mar 15, 2018
@mikaelarguedas
Copy link
Member

This should be develop along the logging of ROS 2 itself (including extend the current set of logging levels and logging over topics). As logging is not currently listed on the Roadmap for Bouncy I'd say after

@ruffsl
Copy link
Member Author

ruffsl commented Mar 16, 2018

To tack onto the list of things to look into developing, I was recently thinking that ROS2 security logs could make use of a Distributed Ledger Technology (DLT), e.g. like blockchain or similar to afford security users a immutable log archive: Distributed Immutabilization of Secure Logs

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants