Site icon LIFARS, a SecurityScorecard company

Importance Of Log Policy And Log Retention: What To Log And How Long You Should Keep It?

Importance Of Log Policy And Log Retention

Importance Of Log Policy And Log Retention

Enterprise systems and software generate a plethora of log entries every day for your security team to handle. For instance, operating system (OS), anti-malware/anti-virus systems, firewalls, user software, intrusion detection and prevention systems (IDS/IPS) are some of the most common log sources. Given that logs record every event, regular log reviews can help identify errors, anomalies, or suspicious activity in your IT infrastructure. This article looks at how log policy can be useful in your security operations.

 

Containing a threat or an event is the first step in the mind of cyber professionals but gathering information and evidence to pursue legal action typically follows immediately afterward. Our Digital Forensics Services specialize in getting to the bottom of every case with deep science and industry experience.

 

What Is Log Policy?

Security-related event logs seek to provide comprehensive information for detecting and reacting to security incidents. Generally, log policy’s scope includes all the systems, applications, and software within the ambit of your IT infrastructure. This policy defines:

What Is Log Retention?

Log retention is basically the duration for which you will store the log entries. In particular, your organization’s Log Policy may contain a section for Log Retention that talks about various types of information you will retain. For example,

What Should You Log?

In short, an organization should record log entries for at least the following:

How Long Should You Keep Them?

In essence, there is no correct answer to this. Every organization operates in a different business environment and faces its own set of threats. Our experts recommend a duration between 12-18 months; however, you must check applicable laws. To clarify, retaining logs for audit and compliance purpose is a mandatory requirement of multiple standards, laws, and regulations. It is ideal to aggregate log data from different sources to a central system. With this intention, modern-day organizations prefer adopting a Security Information and Event Management (SIEM) solution to simplify log management activities. Moreover, efficient SIEM tool also helps organizations in correlation and advanced analysis of log data. Using machine learning algorithms, a SIEM tool can look out for similarities and trends in the collected data in real-time.

Endnotes

With a well-defined log policy and log retention process, log management can turn out to be an effective exercise. However, carelessness in log management can exponentially increase your data storage costs. To increase the effectiveness of their log management programs, organizations should avoid pricing plans proportional to the amount of data. Given that, service providers with big data architecture can provide affordable storage options with minimal downtime.

ICYMI: LIFARS recently introduced the Logchecker tool. It scans log files for extracting relevant pieces of information and matches them with threat intelligence (TI) databases. Moreover, it works on Windows as well as Linux-based operating systems.

Exit mobile version