Eight Security Log Retention Best Practices to Follow | AuditBoard (2024)

A security log is a digital record of all server activity, and gives IT and Security teams a centralized view to log and track users, changes, and more. Security logs are critical to your company for maintaining cybersecurity needs and meeting industry data compliance regulations. This article explains the importance of security logging and outlines eight security log retention best practices to follow.

Why Is Security Log Retention Important?

Maintaining a reliable security log is not only good security posture, but brings you and your company peace of mind. Following security log retention best practices for event logs makes it easier to confirm your security logging processes protect your overall IT infrastructure. Event logs provide important insights into system and network activity. With proper visibility, cybersecurity teams can track activity on the systems and networks within a business, and flag a security event, any unusual activity, or system vulnerabilities. In addition, many industry and security compliance requirements demand detailed activity logs of specific actions within a system or network. Keeping logs is important to keep your business safe and within compliance.

What Security Logs Should Be Kept?

All digital actions create event logs. Some of them are kept in order to meet compliance and/or security needs, while others are disposed of. In each industry, related regulations vary widely. The logs needed for security differ according to individual business needs. Log types that are important for most organizations include user IDs and credentials, terminal identities, system configuration changes, date and timestamp information for access to key assets, successful and failed login attempts, and activity logs of unauthorized access attempts.

How Long Should Security Logs Be Kept?

There is more than one answer to this question. Ultimately, meeting security log retention best practices regarding timelines depends on the cycles of your business and the regulations your organization must adhere to. Most companies keep audit logs, IDS (Intrusion Detection System) logs, and firewall logs for a minimum of two months. There are also numerous laws and regulations that dictate how long businesses must keep event logs. Some examples are:

  1. The Basel II Accord: This regulation requires international banks to keep their activity log for three to seven years.
  2. HIPAA: The Health Insurance Portability and Accountability Act (HIPAA) requires healthcare institutions to keep logs for up to six years.
  3. NERC: The North American Electric Reliability Corporation (NERC) applies to electric power providers, and specifies log retention for six months and audit record retention for three years.
  4. SOX: The Sarbanes-Oxley Act (SOX) concerns corporations active in the United States and requires them to keep audit logs for seven years.
  5. CISP: The Cardholder Information Security Program (CISP) pertains to all ecommerce corporations and requires them to keep their logs for a minimum of six months.
  6. NISPOM: The National Industrial Security Program Operating Manual (NISPOM) requires log retention for at least one year.

Eight Security Log Retention Best Practices to Follow

Here are top items to keep in mind when developing your company’s security log protocols:

1: Define Audit Categories

Decide if a security event is worth capturing in the event logging of your servers and workstations.

2: Monitor Logs

Have a tool that actively monitors event logs and can identify and alert on issues. Security monitoring software is available for this, and keeps tabs on security logs to make sure there are no cybersecurity breaches, like malware or hacking. Read tips on how to prevent cybersecurity breaches for recommendations on how to protect against outside data breaches.

3: Consolidate Records

To obtain a big picture view of network trends, security administrators merge records into a central data store for complete monitoring, analysis, and reporting. Consider automation, the more humans are in the process they increase the likelihood of human error. Automating logs is a good way to make sure the right data is collected and the security logs themselves are reliable.

4: Practice Redundant Data Storage

Keeping data in more than one place is good for cybersecurity, and using two formats creates an auditing advantage. Experts recommend storing log data in database records and as compressed flat files. Event Log Management (ELM) software can be a useful tool for storage and reporting.

5: Monitor Known Threats

Effective security log monitoring includes comparison against a database of known threats. Security logging software often contains this capability. A strong tool may be capable of responding to threats with early action, including sending alerts, logging off users, or even shutting down and restarting systems.

6: Track Users

Most organizations have a collection of users too large to trust the motivations of every password-protected user. Plus, hackers have been known to obtain verified access. For these reasons it’s important to use defensive security strategies separate from outsider monitoring. Using a tool that focuses on user activity can run reports based on user activity logs, and pay special attention to accounts with privileged access, while keeping watch for abnormal usage.

7: Evolve Event Monitoring

When determining an event logging monitoring plan, remember every organization has different rules about what they monitor. An IT or Security department may want to focus solely on security functions, but monitoring other events and actions can indicate issues with applications or hardware, or help find malware. The number of events configured, systems targeted, and frequency of polling will dictate the amount of bandwidth used. If you aren’t yet sure what system needs to configure, start wide and then pare down, decreasing elements as you finalize what to capture.

8: Report Reliably

Good data readouts and reporting is critical for meeting needs of key stakeholders, senior management, auditors, and security or compliance officers. Solid reporting will help you advocate for updating security policies when needed, and also provides the evidence required to show a business meets compliance.

How Long Should Security Incident Reports Be Retained?

Security incident reports are the documentation created with data captured after a security breach or suspicious security event. Current guidelines require that organizations retain all security incident reports and logs for at least six years. The six year count begins at the date of the last entry within the security incident report.

Ready to Start Improving Your Security Log?

This outline of security log retention best practices should make clear what’s needed to ensure your business is able to meet security logging needs and requirements. It’s easy to start improving your security log procedures by using AuditBoard’s connected risk model, starting with our compliance management software.

Eight Security Log Retention Best Practices to Follow | AuditBoard (2024)

FAQs

What is the best practice for log retention? ›

Here are five security log retention best practices:
  • Archive log data centrally. Security logs serve as evidence when you want to conduct forensic analysis. ...
  • Set the maximum security log size. ...
  • Implement a log retention policy. ...
  • Reduce event noise. ...
  • Synchronize the system clocks.

What are the NIST log retention guidelines? ›

NIST 800-171 requires aggregation of 90 days worth of logs, and timely reporting of any incident. A business must maintain system audit records to support the monitoring, analysis, investigation and reporting of unapproved cyber activity, including the ability to generate reports.

How long should you keep security logs? ›

However, if your organization must follow strict laws and regulations, you may keep the most critical logs anywhere between six months and seven years. This timeframe is the log retention period. Retaining logs for extended periods is optimal for security and compliance measures.

What is the log retention policy for ISO 27001? ›

How long should I retain my logs ? The ISO 27001 log retention period is three years, this must be included in your data retention policy.

What is the standard log retention period? ›

The default retention period for Audit (Standard) has changed from 90 days to 180 days. Audit (Standard) logs generated before October 17, 2023 are retained for 90 days. Audit (Standard) logs generated on or after October 17, 2023 follow the new default retention of 180 days.

What is the retention period for NIST audit logs? ›

One year is a commonly agreed upon standard for long retention, meeting most regulations, including the Federal Information Security Management Act of 2002 (FISMA), the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Sarbanes-Oxley Act of 2002 (SOX), the Gramm-Leach-Bliley Act (GLBA), and the ...

What is reasonable security audit log retention? ›

The audit records need to be retained long enough to be reviewed as necessary. Impact: The recommendation is that at least 60 days or 5 gigabytes of audit records are retained. Systems that have very little remaining disk space may have issues retaining sufficient data.

What are retention guidelines? ›

Data retention policies concern what data should be stored or archived, where that should happen, and for exactly how long. Once the retention time period for a particular data set expires, it can be deleted or moved as historical data to secondary or tertiary storage, depending on the requirements.

What are retention standards? ›

A retention standard describes the level of performance necessary to be retained in a job (i.e., the standard written for performance one level above the Unacceptable level).

What is the security log management policy? ›

Security log management comprises the generation, transmission, storage, analysis and disposal of security log data, ensuring its confidentiality, integrity and availability. This process is so important that the Center for Internet Security lists log management as one of its critical security controls.

What is the ISO standard for data retention? ›

ISO 27001 Data Retention Guidelines: Organizations adhering to the International Organization for Standardization ISO 27001 framework are obligated to maintain data logs for a minimum of three years to ensure data security and mitigate potential regulatory penalties.

How often should security logs be reviewed? ›

Reviewing logs every day is recommended. If you review logs daily, you will catch issues sooner and prevent them from becoming major incidents.

How to create a retention policy in security and compliance? ›

For this configuration, you can use either the Microsoft Purview portal or the Microsoft Purview compliance portal.
  1. Depending on the portal you're using, navigate to one of the following locations: ...
  2. Select New retention policy to start the Create retention policy configuration, and name your new retention policy.
Apr 1, 2024

What three components would you include in a record retention policy? ›

Here are three major components of a successful records retention strategy:
  • A retention schedule.
  • Retention policies.
  • Records infrastructure.
  • Qualities of a successful records management system should include:

What is the minimum number of retention policies that you should use? ›

The minimum number of retention policies an organization needs to have is one, establishing a uniform timeframe for data retention across the whole organization.

What are the retention requirements for Sarbanes Oxley logs? ›

SOX Retention Requirements – 7 Years

Sarbanes-Oxley Act of 2002 (SOX) was modified in 2003 to require relevant auditing and review documents to be retained for seven years after the audit or review of the financial statements is concluded.

Where should log data be kept? ›

Keeping data in more than one place is good for cybersecurity, and using two formats creates an auditing advantage. Experts recommend storing log data in database records and as compressed flat files. Event Log Management (ELM) software can be a useful tool for storage and reporting.

What is the best practice for log rotation? ›

Here are some of the best practices of log rotation to get the max out of it:
  1. Date or timestamp style renaming of log files. This format is the most popular and easy to read.
  2. Keep the logs. ...
  3. Periodically move the log file to centralized servers. ...
  4. Keep a centralized log file.

Top Articles
Latest Posts
Article information

Author: Tish Haag

Last Updated:

Views: 6019

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Tish Haag

Birthday: 1999-11-18

Address: 30256 Tara Expressway, Kutchburgh, VT 92892-0078

Phone: +4215847628708

Job: Internal Consulting Engineer

Hobby: Roller skating, Roller skating, Kayaking, Flying, Graffiti, Ghost hunting, scrapbook

Introduction: My name is Tish Haag, I am a excited, delightful, curious, beautiful, agreeable, enchanting, fancy person who loves writing and wants to share my knowledge and understanding with you.