Purpose
System logs are essential for identifying, monitoring for, responding to, and preventing operational problems, security incidents, policy violation and fraudulent activity.
Supporting Policy
System Logging Policy
Log Details
Audit logs must contain at least the following information, where available:
- Date and time of activity
- Origin of activity (e.g., source IP address, location, terminal ID or other means of identification)
- User or entity performing activity
- Description of attempted or completed activity
- Success or failure of attempted activity
Log Retention
Certain audit logs may be required to be archived as part of the record retention procedures or because of requirements to collect evidence. Audit logs must be retained in accordance with the System Logging Standard.
Log Type
|
Active Storage
|
Archive Storage
|
Authentication Logs
|
30 days
|
1 year
|
Network Device Logs
|
30 days
|
1 year
|
User Endpoint Logs
|
30 days
|
1 year
|
Server Logs
|
30 days
|
1 year
|
Storage system, database, and application audit logs must be retained in accordance with the matrix below based on the data classification.
Category
|
Type
|
Active Storage
|
Archive Storage
|
A
|
Healthcare Information
|
30 days
|
6 years
|
B
|
Payment Card Information
|
30 days
|
1 year
|
C |
Student Information |
30 days |
3 years |
D1
|
Confidential Research & Publication Information
|
1 year
|
3 years
|
D2
|
Research & Publications Information
|
30 days
|
90 days
|
E
|
University Administrative & Financial Information
|
30 days
|
1 year
|
F
|
Public Information
|
30 days
|
90 days
|
Log Protection
As an information source that keeps track of important transactions, audit logs are also a prime target for attackers who are keen to hide their activities to maximize opportunities to compromise targeted data. To prevent attackers from hiding their activities, resource proprietors and custodians must configure strong access control around audit logs to limit the number of user accounts that can modify audit log files. Any user that has job-related access to system log are responsible for:
- Limiting access to authorized Departmental IT and OU IT Security personnel, and all such access must be reviewed annually by Departmental IT management.
- Only access, monitor, or analyze logs for legitimate business and job-related purposes.
- Keep log information confidential and not disclose such information to others unless there is a job-related or legal requirement to do so.
Log Review
Procedures for monitoring use of systems must be established and the result of the monitoring activities reviewed regularly. Such procedures are necessary to ensure that users are only performing activities that have been explicitly authorized. By default, logs must be transferred to the OU IT managed logging service in real-time or as quickly as technology allows. Systems that are unable to transfer logs must have an approved exception.
Category
|
Type
|
Review Frequency
|
A
|
Healthcare Information
|
Annually
|
B
|
Payment Card Information
|
Daily
|
C |
Student Information |
Annually |
D1
|
Confidential Research & Publication Information
|
Annually
|
D2
|
Research & Publications Information
|
As Needed
|
E
|
University Administrative & Financial Information
|
Annually
|
F
|
Public Information
|
Annually
|
Log Events
Authentication Logging - Configure local identity and authentication mechanisms to log the events below.
- Successful/failed user login attempts
- Password change
- Account lockout
- Account changes (creation and deletion, account permissions change)
- Inactivity logout
- User add, delete, modify, disable, lock (Success/Failure)
- Group/Role add, delete, and modify (Success/Failure)
Network Device Logging - Use CIS Benchmarks to configure network devices to log the events below:
- User logon and logoff
- Failed logon attempts
- All privileged user actions
- Packet screening denials originating from untrusted networks
- Packet screening denials originating from trusted networks
- User account management
- Modification of packet filters
- Application errors
- System shutdown and reboot
- System errors
- Network connects and disconnects (wired and wireless)
User Endpoint Logging - Inherit the OU User Endpoint Logging GPO on all Windows endpoints or use CIS Benchmarks to determine how to configure endpoints to log:
- Start up and shut down of the system
- Start up and shut down of a service
- Network connection changes or failures
- Changes to, or attempts to change, system security settings and controls
- Successful/failed user login attempts
- Functions performed after a user logged in
- Account changes (creation and deletion, account permissions change)
- Successful/failed use of privileged accounts (e.g., root, admin SYS, domain)
- Act of switching or acting as a different user account (e.g., sudo, RunAs, su)
- System configuration changes, including installation of software patches and updates, or other installed software changes
- File access (Success/Failure)
- File creation (Success/Failure)
- File deletion (Success/Failure)
- File modification (Success/Failure)
- Export/writes/downloads to devices/digital media (e.g., CD/DVD, USB, SD)(Success/Failure), where available
- Import/uploads from devices/digital media (e.g., CD/DVD, USB, SD)(Success/Failure), where available
- User add, delete, modify, disable, lock (Success/Failure)
- Group/Role add, delete, and modify (Success/Failure)
Storage System Logging: Refer to user or administrative manuals to configure storage systems to log:
- File access (Success/Failure)
- File creation (Success/Failure)
- File deletion (Success/Failure)
- File modification (Success/Failure)
- All privileged user actions (e.g., successful or failed permission modification, ownership modification)
- Export/writes/downloads to devices/digital media (e.g., CD/DVD, USB, SD)(Success/Failure), where available
- Import/uploads from devices/digital media (e.g., CD/DVD, USB, SD)(Success/Failure), where available
Database Logging: Use CIS Benchmarks to configure databases to log:
- Successful/failed file or database access attempts
- Successful/failed use of privileged accounts with administrative access (e.g., root, admin SYS, domain)
- Where available, use of privileged access or operations such as grant, modify or revoke access rights, including adding a new user or group, changing user privilege levels, changing file permissions, changing database object permissions, changing firewall rules, and user password changes.
- Creation, adding, or dropping tables/schemas
- Backup and restore events
- Elevated exceptions in the database stored procedures, functions, or triggers
- Use of DBO or other default database account
- Command-line execution of commands
Application Logging: Refer to user or administrative manuals to configure applications to log:
- Authentication successes and failures
- Authorization (access control) failures
- Application data activities (create, modify, delete)
- Where available, use of higher-risk functionality (e.g., addition or deletion of users, changes to privileges, assigning users to tokens, adding or deleting tokens, use of systems administrative privileges, access by application administrators, all actions by users with administrative privileges, access to payment cardholder data, use of data encrypting keys, key changes, data import and export including screen-based reports, submission of user-generated content - especially file uploads).
- Legal and other opt-ins (e.g., permissions for mobile phone capabilities, terms of use, terms & conditions, personal data usage consent, permission to receive marketing communications).
- Application transactions, for example:
- E-mail servers recording the sender, recipients, subject name, and attachment names for each e-mail
- Web servers recording each URL requested and the type of response provided by the server
- Business applications recording which financial records were access by each user
- Export/writes/downloads to devices/digital media (e.g., CD/DVD, USB, SD)(Success/Failure), where available
- Import/uploads from devices/digital media (e.g., CD/DVD, USB, SD)(Success/Failure), where available
- User add, delete, modify, disable, lock (Success/Failure)
- Group/Role add, delete, and modify (Success/Failure)
Server Logging: Inherit the OU Member Server GPO on all Windows servers or refer to user or administrative manuals to determine how to configure servers to log:
- Start up and shut down of the system
- Start up and shut down of a service
- Network connection changes or failures
- Changes to, or attempts to change, system security settings and controls
- Successful/failed user login attempts
- Functions performed after a user logged in
- Account changes (creation and deletion, account permissions change)
- Successful/failed use of privileged accounts (e.g., root, admin SYS, domain)+
- Act of switching or acting as a different user account (e.g., sudo, RunAs, su)
- System configuration changes, including installation of software patches and updates, or other installed software changes
- Application startup and shutdown
- Application failures
- File access (Success/Failure)
- File creation (Success/Failure)
- File deletion (Success/Failure)
- File modification (Success/Failure)
- Export/writes/downloads to devices/digital media (e.g., CD/DVD, USB, SD)(Success/Failure), where available
- Import/uploads from devices/digital media (e.g., CD/DVD, USB, SD)(Success/Failure), where available
- User add, delete, modify, disable, lock (Success/Failure)
- Group/Role add, delete, and modify (Success/Failure)
Anti-Virus Logging: Use the OU Anti-Virus client on all computers and servers to log:
- Detection of suspicious or malicious activity with outcomes (cleaned or not)
- Anti-virus protection failures
- Internal connection to known malware IP address
Compliance
The Office of Information Technology Governance, Risk, and Compliance (GRC) team, with assistance from Asset Administrators will verify compliance with this Standard by testing system logging controls at least annually, and more often as needed.
Revision, Review, and Approval History
- August 2023: OU IT Governance, Risk, and Compliance: Initial draft, opened for comments
- September 2023: College of Medicine Cell Biology: Standard reviewed, comments submitted
- September 2023: OU IT Classified Research: Standard reviewed, comments submitted
- October 2023: OU IT Digital Innovation Group: Standard reviewed, comments submitted
- December 2023: OU IT Governance, Risk, and Compliance: Comment period closed
- March 2023: OU IT Governance, Risk, and Compliance: See PSP Comment Summary for details.