S 5.9 Logging on the server

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

A reasonable amount of the logging functionality available on the network server should be activated. The network administrator must examine the log files of the network server at regular intervals. All security-related events must be logged. When logging, the following events in particular are of interest:

How many other events are logged in addition to these events depends on the protection requirements of the particular IT systems, among other things. The higher the protection requirement is, the greater the number of events that should be logged.

Since the log files can become very large over time, the log evaluation intervals selected should be short enough to ensure that it is feasible to evaluate the logs. To ensure effective evaluation is possible, every log entry should contain the user identifier or process number, the name of the device, and the time and date.

It must be examined which legal or contractual retention periods apply to the log files. A minimum retention time may be specified in order to guarantee the ability to trace all activities, and a deletion requirement may apply due to data protection regulations (see also S 2.110 Data protection guidelines for logging procedures).

Review questions: