5 Best Practices For Security Log Retention (2024)

When a cybersecurity incident occurs, logs are the key to understanding what happened. But managing and retaining those logs can become unwieldy, especially for larger environments.

Developing a log management strategy can help you to understand how to properly retain logs, as well as how long you need to retain them for.

Log Types

First, it’s important to understand the different types of log files that an environment generates.

  • Access logs. These logs contain login information, including users that accessed specific files or programs.
  • Server logs. These logs track activity on a specific server, whether it’s a web server, application server, or file server.
  • Event logs. These logs capture a variety of activities from network traffic, including login attempts, application events, API requests, and more. Event log is also a component of Microsoft Windows Event Viewer, but the term is used generically across all operating systems.
  • Audit logs. Audit log, also called audit trail, is a type of event log that is a record of events and changes. It generally captures a specific sequence of events, who performed an activity and how the system responded.
  • System logs. System logs, also known as syslog, refers to a log of activity generated by the operating system, whether that is Windows, Linux, or MacOS. This activity can include system modifications, startup notifications, errors, and more.

Why Do You Need To Retain Security Logs?

Log retention policies, or how long to store logs, depends on business needs and specific compliance requirements. However, retaining security logs for some period of time is generally a good idea for most organizations.

  • Streamlines Incident Response

Without robust historical log data, incident responders — the team that investigates what happened leading up to, during, and after a security event — won’t have the necessary data to work with.

Logs provide a very accurate picture of an attacker’s initial access, when they first entered, what systems the attacker touched, and what data they accessed.

When an organization has a SIEM that retains log data for at least 90 days — or even better, six months to a year — the incident response team can more easily determine how long an attacker was in an environment, further easing the incident response process.

  • Obtain a Cyber Insurance Policy

Cyber insurance companies often require organizations to retain logs for a certain period of time in order to obtain coverage. That’s because insurers want to limit their losses as much as possible.

After a cyberattack, cyber insurance companies often hire external parties such as legal teams and digital forensics and incident response (DFIR) firms to understand the scope of the attack.

Without proper log retention, those external parties will take longer to do their jobs, thus their services will be more expensive — negatively impacting the insurance company’s bottom line. Lack of adequate logging can also make it difficult to determine the scope of a breach, which can further elevate costs for the business and insurer.

  • Meet Compliance Requirements

If your organization needs to meet a compliance framework, there’s a good chance that retaining logs is a requirement. Different compliance frameworks have different retention period recommendations:

  • HIPAA: 6 years
  • PCI DSS: 1 year
  • ISO 27001: 3 years
  • NIST: 3 years
  • SOX: 7 years
  • GLBA: 6 years

It’s important to check the specific log retention requirements of the compliance framework you’re working with.

5 Best Practices For Security Log Retention (1)

Log Retention Best Practices

Perform an Asset Inventory

First things first: where are you gathering logs from? Without a hardware and software inventory, you may be overlooking crucial log sources. Not only is an asset inventory important for log monitoring, but it can help you to get started with maturing your information security program — you can’t secure what you don’t know is there.

If you don’t know how to get started with an asset inventory, public cloud services offer a good starting point. Public cloud services can be higher risk because you can’t just unplug them like a server. Gather every service that users need to log into, such as Windows accounts, Microsoft 365, Paypal, etc. Recording that information can be as simple as using an Excel spreadsheet, but paid asset management platforms offer more robust features.

Determine What To Log

Logging every single event from every workstation within your environment is complicated to do on your own, and can result in labor challenges for your IT team, as it often presents storage, data transmission, and maintenance challenges. Plus, if you use a commercial SIEM solution, your licensing costs could quickly get out of control — although this isn’t an issue for Blumira customers.

A good method is to consume logs more aggressively from high-value systems, high-risk systems, and those facing external networks. For example, application logs, firewall logs, DNS, and authentication logs can all offer useful information from a security perspective, as well as logs from sources such as an intrusion detection system (IDS)/ intrusion prevention system (IPS). Then you can save in areas that tend to be noisier, such as account lockouts.

Learn What Log Sources You Should Prioritize >

Centralize Your Logs

Gathering Windows Event Viewer logs from every endpoint is often an impossible task, even for smaller environments. Windows Event Viewer is also clunky and difficult to work with; it can’t provide real visibility into the processes within your machines.

That’s why the most important log retention best practice is to archive logs into a central repository, such as a security information and event management (SIEM) platform. A SIEM not only collects logs, but it correlates logs and other security-related documentation for analysis.

Retain Logs Offsite

Attackers commonly hide their tracks by modifying, deleting or destroying logs. For example, if an attacker gained access to an elevated user account, they may lock up log files or delete temporary accounts that they used in the attack.

That’s why it’s important for a SIEM to store logs immutably and offsite, meaning that they cannot be changed or deleted.

Keep Event Log Data ‘Hot’ When Possible

When retaining logs, it’s important to consider where you’ll be storing them. The average time to initially detect a breach is 212 days, according to IBM. Keeping security event logs in hot storage, however, can aid organizations in investigation once a breach is discovered.

Hot storage can be accessed quickly, either on a solid-state drive (SSD) or in the public cloud, while cold “cheap and deep” storage, like object storage, is archived and rarely accessed.

Not only is hot storage important from a cybersecurity perspective, but it’s a requirement for certain compliance frameworks. PCI DSS, for example, specifies all logs from in-scope systems to be retained “hot” for three months and in some other accessible format for 12 months or a year.

To store hot data, you can use a service such as Azure Hot Blobs or AWS, or a cloud SIEM. These services don’t come cheap, however, and many SIEM vendors only offer a limited amount of hot storage. Blumira, on the other hand, retains one year of hot storage by default on Cloud and Advanced Editions.

Consider a SIEM with Built-in Retention

The easiest method to retain logs, especially for smaller IT and security teams, is to send logs to a cloud SIEM. This prevents you from having to purchase and configure storage or deal with public cloud expenses.

But sending logs to a SIEM can also be a costly solution, as many vendors charge based on log ingestion and don’t retain log data by default. Or a vendor may retain a limited amount of data, such as 30 days — which is often too limited of a retention policy for organizations that need to be compliant.

It’s important to look for a solution that offers a flat fee and retains at least one year of data by default, such as Blumira.

How Blumira Handles Log Retention

Blumira retains one year of data by default in our Cloud and Advanced editions, so there’s no need to export logs every three months and store them in a different location.

Access and review all of your current and past findings with our convenient portal, offered as part of your flat fee, subscription-based pricing model. Other SIEM providers charge their customers if they want to access their own logs.

We protect log data both in transit and at rest to ensure attackers cannot gain access to log archives to read data without the appropriate keys. The Blumira log database is only accessible to internal Blumira services and parties that require access.

We also maintain raw log data while tracking and identifying log messages to ensure data integrity and validation. Through periodic review and internal processes, we validate that incoming logs have not been tampered with, while alerting customers if any workstation/server audit logs are cleared.

Blumira: Beyond Log Retention

Blumira is much more than a centralized log repository. We’re dedicated to helping small teams achieve easy-to-use, effective security that meets compliance and protects them against security incidents such as breaches and ransomware. We do things differently by providing more value for better security outcomes, including:

  • Automate Tasks For You – We do all the heavy lifting for your team to save them time, including parsing, creating native third-party integrations, and testing and tuning detection rules to reduce noisy alerts.
  • Faster Time to Security – Our unique approach to detections notifies you of threats other security tools may miss, sending you real-time alerts in under a minute of initial detection to help you respond to threats faster than ever.
  • Easily Meet Compliance – With a year of data retention and deployment that takes minutes to hours, we help you meet cyber insurance and compliance easily and quickly with the team you have today.

Blumira’s free edition integrates directly with your Microsoft 365 tenant to detect suspicious activity in your environment — at no cost. Get your free account and see the value of Blumira today.

As a cybersecurity expert with extensive experience and knowledge in the field, I recognize the critical importance of effective log management in understanding and mitigating cybersecurity incidents. Throughout my career, I have dealt with various organizations, both large and small, assisting them in developing robust log management strategies.

In the context of the provided article, I'd like to elaborate on the concepts and best practices related to log management:

Log Types:

  1. Access Logs:

    • Contain login information, including users accessing specific files or programs.
  2. Server Logs:

    • Track activity on specific servers, such as web servers, application servers, or file servers.
  3. Event Logs:

    • Capture various activities like network traffic, login attempts, application events, API requests, etc.
  4. Audit Logs:

    • Record events and changes in a specific sequence, detailing who performed an activity and how the system responded.
  5. System Logs (Syslog):

    • Log activity generated by the operating system, including system modifications, startup notifications, errors, etc.

Why Retain Security Logs:

  1. Streamlining Incident Response:

    • Historical log data facilitates accurate investigation by providing insights into an attacker’s actions, entry points, systems touched, and data accessed.
  2. Obtaining Cyber Insurance:

    • Retaining logs for a specified period is often a requirement for obtaining cyber insurance coverage, as it aids external parties (legal, DFIR firms) in understanding the scope of a cyberattack.
  3. Meeting Compliance Requirements:

    • Different compliance frameworks have varied log retention recommendations (e.g., HIPAA, PCI DSS, ISO 27001, NIST, SOX, GLBA).

Log Retention Best Practices:

  1. Perform an Asset Inventory:

    • Identify crucial log sources by conducting a comprehensive hardware and software inventory.
  2. Determine What To Log:

    • Prioritize logging from high-value and high-risk systems, focusing on areas that provide valuable security information.
  3. Centralize Your Logs:

    • Archive logs into a central repository, such as a Security Information and Event Management (SIEM) platform, for effective analysis.
  4. Retain Logs Offsite:

    • Store logs immutably and offsite to prevent tampering or deletion by attackers.
  5. Keep Event Log Data ‘Hot’ When Possible:

    • Maintain security event logs in easily accessible "hot" storage for quicker investigation during a breach.
  6. Consider a SIEM with Built-in Retention:

    • Utilize a SIEM solution with built-in retention, ensuring the storage of logs for a specified period without additional configuration.

How Blumira Handles Log Retention:

  1. Retention Duration:

    • Blumira retains one year of data by default in Cloud and Advanced editions.
  2. Data Protection:

    • Log data is protected in transit and at rest to prevent unauthorized access.
  3. Integrity and Validation:

    • Raw log data is maintained while tracking and identifying log messages to ensure data integrity and validation.

Beyond Log Retention - Blumira's Value:

  1. Automation:

    • Blumira automates tasks, saving time for security teams in tasks like parsing, integration, and detection rule tuning.
  2. Faster Time to Security:

    • Real-time alerts within minutes of initial detection enhance the speed of response to threats.
  3. Compliance Assistance:

    • With a year of data retention, Blumira aids organizations in meeting cyber insurance and compliance requirements efficiently.
  4. Free Edition:

    • Blumira's free edition integrates with Microsoft 365 for detecting suspicious activity at no cost.

In conclusion, effective log management is a cornerstone of cybersecurity, aiding organizations in incident response, compliance, and overall security posture. Blumira's approach goes beyond mere log retention, providing additional value to organizations in their security efforts.

5 Best Practices For Security Log Retention (2024)

FAQs

How long should security logs be retained? ›

Most organizations find that a minimum of one year meets most regulatory requirements. However, you must be mindful of your organization's industry standards, regulations, and laws, as well as your company's cybersecurity concerns.

What are the NIST audit log retention requirements? ›

NIST 800-171 requires aggregation of 90 days worth of logs, and timely reporting of any incident. A business must maintain system audit records to support the monitoring, analysis, investigation and reporting of unapproved cyber activity, including the ability to generate reports.

What is reasonable security audit log retention? ›

Different compliance frameworks have different retention period recommendations: HIPAA: 6 years. PCI DSS: 1 year. ISO 27001: 3 years.

What are the best practices for audit log storage? ›

Best practices for Cloud Audit Logs
  • Choose where your logs are stored.
  • Define data retention periods.
  • Protect your audit logs with customer-managed encryption keys.

What is the regulation for log retention? ›

CCPA mandates the retention of logs related to consumer data processing for a minimum of 12 months. Logs should include information about data access and requests from consumers. Organizations must promptly respond to consumer requests for their data logs.

How long should logs be kept for? ›

Firewood can last a very long time when stored properly. We've heard reports of wood still being dry and easily flammable after 10 years, but we'd recommend 2-3 years maximum. Good firewood needs to be dry. As long as your wood storage solution keeps wood away from moisture, it should be good to burn for a long while.

What is a good record retention policy? ›

Generally, the files should be kept as long as they serve a useful purpose or until all legal and regulatory requirements are met. Businesses often base how long they keep files on the length of the statute of limitations for breach of contract, breach of fiduciary duty, and professional liability claims.

What is the 117.315 requirements for record retention? ›

§ 117.315 Requirements for record retention.

(1) All records required by this part must be retained at the plant or facility for at least 2 years after the date they were prepared.

What are the retention requirements? ›

Retention Requirement means the requirements and obligations of the Retention Provider as set forth in the Retention Letter. Retention Requirement means the requirements and obligations of the Retention Provider as set forth in the Retention of Net Economic Interest Letter.

What is the new audit log retention policy? ›

The default retention period for Audit (Standard) has changed from 90 days to 180 days. Audit (Standard) logs generated before October 17, 2023 are retained for 90 days. Audit (Standard) logs generated on or after October 17, 2023 follow the new default retention of 180 days.

How often should security logs be reviewed? ›

Reviewing logs every day is recommended. If you review logs daily, you will catch issues sooner and prevent them from becoming major incidents.

What is the 10 year audit log retention? ›

What is Microsoft 10 Year Audit Log Retention? Microsoft 10 Year Audit Log Retention is a feature that allows organizations to retain their audit logs for up to 10 years. This can be crucial for companies that have to comply with certain regulations that require them to keep a long-term record of their activities.

How long should audit logs be kept? ›

SOX: The Sarbanes-Oxley Act (SOX) concerns corporations active in the United States and requires them to keep audit logs for seven years. CISP: The Cardholder Information Security Program (CISP) pertains to all ecommerce corporations and requires them to keep their logs for a minimum of six months.

How do you store logs efficiently? ›

Aggregate and Centralize Your Logs Collected

As IT systems generate logs, your log aggregator tool (e.g. Logstash, Graylog, etc.) should automatically ingest those logs and ship them out of the production environment and into a centralized location (e.g. public cloud storage, or a log management tool).

What makes a good audit log? ›

Comprehensive Coverage: Make sure logs capture appropriate and crucial data such as user IDs, timestamps, event types, affected resources, and outcomes of events. Regular Review: Review audit logs regularly. This allows early detection of suspicious activity, bugs, and system errors.

How long are access logs kept? ›

As a baseline, most organizations keep audit logs, IDS logs and firewall logs for at least two months. On the other hand, various laws and regulations require businesses to keep logs for durations varying between six months and seven years.

What is the longest period for which audit logs can be retained? ›

You can retain audit logs for up to 10 years. You can create policies based on the following criteria: All activities in one or more Microsoft services. Specific activities in a Microsoft service performed by all users or by specific users.

Top Articles
Perform a factory reset on your Galaxy phone or tablet
Russia can sustain war effort ‘for another two or three years,’ say analysts | CNN
Mchoul Funeral Home Of Fishkill Inc. Services
Srtc Tifton Ga
Truist Bank Near Here
Phcs Medishare Provider Portal
Lifebridge Healthstream
Falgout Funeral Home Obituaries Houma
CHESAPEAKE WV :: Topix, Craigslist Replacement
Draconic Treatise On Mining
Mivf Mdcalc
Bubbles Hair Salon Woodbridge Va
Whitley County Ky Mugshots Busted
How do you like playing as an antagonist? - Goonstation Forums
Premier Reward Token Rs3
Fairy Liquid Near Me
104 Whiley Road Lancaster Ohio
Las 12 mejores subastas de carros en Los Ángeles, California - Gossip Vehiculos
Carson Municipal Code
Sprinkler Lv2
Lista trofeów | Jedi Upadły Zakon / Fallen Order - Star Wars Jedi Fallen Order - poradnik do gry | GRYOnline.pl
Craigslistodessa
Costco Gas Hours St Cloud Mn
Craigslist Hunting Land For Lease In Ga
Die 8 Rollen einer Führungskraft
Speechwire Login
Otis Inmate Locator
Elanco Rebates.com 2022
Chapaeva Age
In Branch Chase Atm Near Me
Σινεμά - Τι Ταινίες Παίζουν οι Κινηματογράφοι Σήμερα - Πρόγραμμα 2024 | iathens.gr
Pitco Foods San Leandro
Gold Nugget at the Golden Nugget
Kazwire
Red Dead Redemption 2 Legendary Fish Locations Guide (“A Fisher of Fish”)
Legit Ticket Sites - Seatgeek vs Stubhub [Fees, Customer Service, Security]
The Holdovers Showtimes Near Regal Huebner Oaks
Cygenoth
Invalleerkracht [Gratis] voorbeelden van sollicitatiebrieven & expert tips
Scarlet Maiden F95Zone
Casamba Mobile Login
Pulitzer And Tony Winning Play About A Mathematical Genius Crossword
What is 'Breaking Bad' star Aaron Paul's Net Worth?
Zipformsonline Plus Login
Zom 100 Mbti
Crigslist Tucson
Joy Taylor Nip Slip
French Linen krijtverf van Annie Sloan
Pulpo Yonke Houston Tx
One Facing Life Maybe Crossword
Generator für Fantasie-Ortsnamen: Finden Sie den perfekten Namen
Latest Posts
Article information

Author: Barbera Armstrong

Last Updated:

Views: 6038

Rating: 4.9 / 5 (59 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Barbera Armstrong

Birthday: 1992-09-12

Address: Suite 993 99852 Daugherty Causeway, Ritchiehaven, VT 49630

Phone: +5026838435397

Job: National Engineer

Hobby: Listening to music, Board games, Photography, Ice skating, LARPing, Kite flying, Rugby

Introduction: My name is Barbera Armstrong, I am a lovely, delightful, cooperative, funny, enchanting, vivacious, tender person who loves writing and wants to share my knowledge and understanding with you.