By retaining logs to meets compliance log retention standards and using these logs to identify potential threats focusing on user access and activity logs to catch additional risk factors and implementing an overall strategy around security log monitoring you are on your way to better identifying and alerting on security issues.
Security log management standards.
Event logs recording user and administrative activities exceptions faults and information security events must be configured securely stored monitored and reviewed to help detect unauthorized activities on the university network or unauthorized access to university it resources.
The national institute of standards and technology nist developed this document in furtherance of its statutory responsibilities under the federal information security management act fisma of 2002 public law 107 347.
If your organization is public non compliance with sarbanes oxley for example can result in heavy fines and legal liability for the officers.
Leveraging these standards can provide you with a blueprint for your own internal security plans and log management strategy.
The policy should define the objectives the organization wants to meet by.
Routine log analysis is.
The national institute of standards and technology nist developed this document in furtherance of its statutory responsibilities under the federal information security management act fisma of 2002 public law 107 347.
Need for computer security log management the process for generating transmitting storing analyzing and disposing of computer security log data.
This publication seeks to assist organizations in understanding the need for sound computer security log management.
Creating a security log management process the first step in creating a log management process is the creation of a policy.