S 4.172 Logging of the archival accesses

Initiation responsibility: Head of IT

Implementation responsibility: Administrator, Head of IT

The accesses to electronic archives must be logged. This is intended to guarantee the traceability of activities and to allow possible error corrections. The following list provides an overview of the types of events that can be detected with the help of logging:

The extent of logging depends on the requirements regarding the traceability and authenticity of the documents stored in the archives on the one hand. On the other hand, the regulations agreed upon within the organisation must also be observed, e.g. regarding data protection.

If possible, at least the following data should be logged:

The retention period for the logged data must be defined in the archiving concept.

The logged data must be analysed regularly taking into consideration organisational specifications in order to detect misuse and system errors. Analysis may be carried out manually or with the help of a tool. Critical events should be defined in advance as such events the occurrence of which requires a notification of an administrator. Such incidents should be signalled immediately, e.g. using existing system management environments. Furthermore, it is important that the notification is performed in a role-related and not in a person-related manner. If, for example, an email is sent to a specific person, the message may remain undetected if this person is absent.

The following events are typically characterised by a high criticality during archiving and should therefore be logged permanently, monitored, and signalled immediately if they occur:

After signalling, the event should be examined and, if required, escalated further immediately. Typically, a first escalation is performed to the Head of IT. However, other escalation processes may also be designed depending on the organisation.

Review questions: