Information Logging Standard PDF
Information Logging Standard PDF
1. Overview
Logging from critical systems, applications and services can provide key information and
potential indicators of compromise. Although logging information may not be viewed on a daily
basis, it is critical to have from a forensics standpoint.
2. Purpose
The purpose of this document attempts to address this issue by identifying specific requirements
that information systems must meet in order to generate appropriate audit logs and integrate with
an enterprise’s log management function.
The intention is that this language can easily be adapted for use in enterprise IT security policies
and standards, and also in enterprise procurement standards and RFP templates. In this way,
organizations can ensure that new IT systems, whether developed in-house or procured, support
necessary audit logging and log management functions.
3. Scope
This policy applies to all production systems on <Company Name> Network.
4. Standard
4.1 General Requirements
All systems that handle confidential information, accept network connections, or make access
control (authentication and authorization) decisions shall record and retain audit-logging
information sufficient to answer the following questions:
1. Type of action – examples include authorize, create, read, update, delete, and accept
network connection.
2. Subsystem performing the action – examples include process or transaction name,
process or transaction identifier.
3. Identifiers (as many as available) for the subject requesting the action – examples include
user name, computer name, IP address, and MAC address. Note that such identifiers
should be standardized in order to facilitate log correlation.
4. Identifiers (as many as available) for the object the action was performed on – examples
include file names accessed, unique identifiers of records accessed in a database, query
parameters used to determine records accessed in a database, computer name, IP address,
and MAC address. Note that such identifiers should be standardized in order to facilitate
log correlation.
5. Before and after values when action involves updating a data element, if feasible.
6. Date and time the action was performed, including relevant time-zone information if not
in Coordinated Universal Time.
7. Whether the action was allowed or denied by access-control mechanisms.
8. Description and/or reason-codes of why the action was denied by the access-control
mechanism, if applicable.
5. Policy Compliance
5.1 Compliance Measurement
The Infosec team will verify compliance to this policy through various methods, including but
not limited to, periodic walk-thrus, video monitoring, business tool reports, internal and external
audits, and feedback to the policy owner.
5.2 Exceptions
Any exception to the policy must be approved by the Infosec team in advance.
5.3 Non-Compliance
An employee found to have violated this policy may be subject to disciplinary action, up to and
including termination of employment.
8 Revision History
June 2014 SANS Policy Team Updated and converted to new format.