Guidance on NIST 800-171 log retention (2024)

Keeping security logs is a balance between wanting to have documentation if it’s needed and keeping way too much for too long. Fortunately, we have some guidance that considers best-practices security without the need to build your own data center to house the logs.

What is log retention?

Log files are detailed, text-based records of events. Many devices and applications generate them, including anti malware, system utilities, firewalls, intrusion detection and prevention systems (IDSes/IPSes), servers, workstations, and networking equipment.

Log retention is the regular archiving of event logs, particularly those significant to cyber security. The logs provided are essential for security monitoring. While retaining logs for extended periods provides more historical information, holding on to that data can become expensive.

Log files provide a crucial audit trail and can help monitor activity within the IT infrastructure, identify policy violations, pinpoint fraudulent or unusual activity, and highlight security incidents. Security teams can use them to detect and respond to indicators of compromise, investigate and analyze where an attack is coming or came from, and establish how it has affected IT resources.

Guidance on NIST 800-171 log retention (1)

Log retention guidance

Developing a cyber security log policy is an integral part of your security program. Log retention varies wildly, with some companies keeping them only for a month and others holding on to them for seven years.

One year is a commonly agreed upon standard for long retention, meeting most regulations, including the Federal Information Security Management Act of 2002 (FISMA), the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Sarbanes-Oxley Act of 2002 (SOX), the Gramm-Leach-Bliley Act (GLBA), and the Payment Card Industry Data Security Standard (PCI DSS).

NIST 800-171 offers general guidance for contractors regarding logging requirements:

Basic Security Requirements:

3.3.1 Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity.

3.3.2 Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.

Derived Security Requirements:

3.3.3 Review and update logged events.

3.3.4 Alert in the event of an audit logging process failure.

3.3.5 Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.

3.3.6 Provide audit record reduction and report generation to support on-demand analysis and reporting.

3.3.7 Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate timestamps for audit records.

3.3.8 Protect audit information and audit logging tools from unauthorized access, modification, and deletion.

3.3.9 Limit management of audit logging functionality to a subset of privileged users.

Although NIST explains the basic security requirements, the guidance does not explicitly mention the length of time needed for log retention. Therefore, the best practice for contractors is to follow the requirements of their specific agency.

For example, the log retention requirements for DoD contractors that may process, store, or transmit DoD CUI come from DFARS 252.204-7012. It says that all DoD contractors in this category must comply with all controls in 800-171, and Paragraph E within that clause requires contractors to retain logs for at least 90 days. Additionally, it says that if the contractor is using a cloud-based service to retain logs, that cloud vendor must also retain the logs it stores relevant to the client’s in-scope CUI network for 90 days.

How to manage cyber security logs

Guidance on NIST 800-171 log retention (2)

Security log management comprises the generation, transmission, storage, analysis, and disposal of security log data, ensuring its confidentiality, integrity, and availability.

Organizations that fail to collect, store, and analyze system events are missing a critical piece of modern security practice. Log management allows companies to perform general audits, establish baselines, and identify operational trends and longer-term problems. This is why various laws and standards, such as HIPAA and DFARS 252.204-7012, require log management for compliance and reporting.

Because logs come from multiple endpoints and different sources and formats, they require normalizing for easy searching, comparison, and readability. The systems and media which share and retain logs must be highly secure with tightly controlled access. In addition, they must be capable of processing large amounts of data without impairing overall system performance.

The security events an organization captures depend on the industry and relevant legal requirements. However, several events should always be captured and logged to ensure user accountability and help companies detect, understand, and recover from an attack, including:

  • Authentication successes and failures
  • Access control successes and failures
  • Session activity, such as files and applications used, particularly system utilities
  • Changes in user privileges
  • Processes starting or stopping
  • Changes to configuration settings
  • Software installed or deleted
  • Devices attached or detached
  • System or application errors and alerts
  • Alerts from security controls, such as firewalls, IDSes, and antimalware

Fault logging—faults generated by the system and the applications running on it—can be used to find issues with a system or application and identify indications of faulty equipment and should include:

  • Date and time
  • User and/or device ID
  • Network address and protocol
  • Location when possible
  • Event or activity

Compromised or inaccurate logs can hamper investigations into suspicious events, undermine their credibility, and invalidate disciplinary and court actions.

One way to ensure trustworthy logs is to use synchronized system clocks, giving every log entry an accurate timestamp. This involves obtaining a reference time from an external source, combined with a network time protocol, to sync internal clocks. Always record the time of an event in a consistent format, such as Coordinated Universal Time. For additional security, add a checksum.

Here are three other best practices to follow:

1. Actively use logs for monitoring

Collected data is worthless unless it is monitored, analyzed, and acted on. Logging and auditing ensure that users are only performing authorized activities. These processes also play a role in preventing inappropriate activity, as well as ensuring hostile actions are tracked down and stopped.

2. Give admins and sysops extra scrutiny

One area that requires extra consideration is administrator and system operator (sysop) activities. These users have powerful privileges, and their actions must be carefully recorded and checked. To that end, these users should not be allowed physical or network access to logs of their activities. Additionally, those tasked with reviewing logs should be independent of the people, activities, and logs under review.

3. Use logging tools

Due to the volume of incoming data organizations confront daily, most need a dedicated log management system to improve management, event correlation, and analysis. A specialized system also increases dashboard data and report quality.

Security Information and Event Management (SIEM) solutions are a common approach used to aggregate log data from multiple sources. SIEM systems can parse and analyze data in real-time to identify deviations from common actions in the network’s systems. If an anomaly is detected, SIEM systems can generate alerts, possibly activating additional security mechanisms. They can be rules-based, often employing a statistical correlation engine to establish relationships between event log entries. Advanced systems further rely on user and entity behavior analytics, security orchestration, automation, and response tools.

Security monitoring policies and log retention are just two elements of a comprehensive cybersecurity plan. DTS can assess your unique needs and industry requirements to determine how your company should address log retention. We offer GCC High licensing and integration as well as other secure data storage solutions.

Guidance on NIST 800-171 log retention (2024)
Top Articles
Business News Today: Read Latest Business News, Live India Share Market News, Finance & Economy News | Mint
Minergate CLI Miner Tool: A Comprehensive Guide to Mining Cryptocurrencies
Top 11 Best Bloxburg House Ideas in Roblox - NeuralGamer
Umbc Baseball Camp
Warren Ohio Craigslist
Sound Of Freedom Showtimes Near Governor's Crossing Stadium 14
Citibank Branch Locations In Orlando Florida
Top Financial Advisors in the U.S.
Nordstrom Rack Glendale Photos
Merlot Aero Crew Portal
Category: Star Wars: Galaxy of Heroes | EA Forums
Ogeechee Tech Blackboard
Autozone Locations Near Me
Www.paystubportal.com/7-11 Login
Kinkos Whittier
Insidekp.kp.org Hrconnect
The most iconic acting lineages in cinema history
Jesus Calling Oct 27
Aberration Surface Entrances
25Cc To Tbsp
1-833-955-4522
Grayling Purnell Net Worth
The best TV and film to watch this week - A Very Royal Scandal to Tulsa King
Schedule 360 Albertsons
Qhc Learning
Scream Queens Parents Guide
Talk To Me Showtimes Near Marcus Valley Grand Cinema
Uncovering The Mystery Behind Crazyjamjam Fanfix Leaked
Hellraiser 3 Parents Guide
Craigslist Ludington Michigan
Pacman Video Guatemala
Downtown Dispensary Promo Code
Infinite Campus Asd20
Barbie Showtimes Near Lucas Cinemas Albertville
N.J. Hogenkamp Sons Funeral Home | Saint Henry, Ohio
Otis Inmate Locator
Devotion Showtimes Near The Grand 16 - Pier Park
Eero Optimize For Conferencing And Gaming
3 Bedroom 1 Bath House For Sale
Martin Village Stm 16 & Imax
THE 10 BEST Yoga Retreats in Konstanz for September 2024
Poe Flameblast
Cookie Clicker The Advanced Method
2700 Yen To Usd
More News, Rumors and Opinions Tuesday PM 7-9-2024 — Dinar Recaps
Freightliner Cascadia Clutch Replacement Cost
Every Type of Sentinel in the Marvel Universe
What Does the Death Card Mean in Tarot?
Kidcheck Login
Zom 100 Mbti
Public Broadcasting Service Clg Wiki
Ark Silica Pearls Gfi
Latest Posts
Article information

Author: Domingo Moore

Last Updated:

Views: 6208

Rating: 4.2 / 5 (53 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Domingo Moore

Birthday: 1997-05-20

Address: 6485 Kohler Route, Antonioton, VT 77375-0299

Phone: +3213869077934

Job: Sales Analyst

Hobby: Kayaking, Roller skating, Cabaret, Rugby, Homebrewing, Creative writing, amateur radio

Introduction: My name is Domingo Moore, I am a attractive, gorgeous, funny, jolly, spotless, nice, fantastic person who loves writing and wants to share my knowledge and understanding with you.