University of Minnesota  Appendix

Log Management Standard

Sidebar

Expand all

Sidebar

Table of Contents

TOC placeholder

Governing Policy

Questions?

Please use the contact section in the governing policy.

Objective

Event logs recording user and administrative activities, exceptions, faults, and information security events must be configured, securely stored, monitored, and reviewed to help detect unauthorized activities on the University network or unauthorized access to University IT resources. Timely action must be taken in response to the identification of a potential security event in the logs. To protect the integrity of the logs, maintain the separation of duties for monitoring logs from those who have access to delete or modify the logs, or change the configuration of the logs.

University Information Security determines the logs they need access to for on-going incident response activities and those needed for forensic, or ad-hoc security incident investigation.

Security Controls

Event Logging

The following table defines the baseline security controls for activities to include in log collection.

ControlSecurity Level
IDDescriptionHighMediumLow
LM.A.01For systems: Access attempts: successful and unsuccessful, changes to system configuration, or security protection systemRequired
Effective July 2019
Required
Effective July 2019
Required
Effective July 2019
LM.A.02For applications: Access attempts: successful and unsuccessful, or changes to application configurationRequired
Effective July 2019
RecommendedRecommended
LM.A.03Use of privilege escalation on system or application (e.g. sudo, Microsoft UAC, RunAs)Required
Effective July 2019
Required
Effective July 2019
Required
Effective July 2019
LM.A.04Direct use of system administrator accountRequired
Effective July 2019
Required
Effective July 2019
Required
Effective July 2019
LM.A.05Files and database records accessed and type of access for private-highly restricted data (e.g., create, read, update, delete)Recommended1RecommendedRecommended
LM.A.06Security alerts raised by the application, systems, or account managementRequired
Effective July 2019
Required
Effective July 2019
Recommended
LM.A.07For systems: Account creation, modification, deletion, or change of privilegesRequired
Effective July 2019
Required
Effective July 2019
Recommended
LM.A.08For applications: Account creation, modification, deletion, or change of privilegesRequired
Effective July 2019
RecommendedRecommended

1 Required for:

  • Health information, HIPAA or ePHI compliance on in-scope systems and applications;
  • PCI DSS on all systems or applications that store, process, or transmit cardholder data, or support the credit card processing environment.

Clock Synchronization

The following table defines the baseline security controls to synchronize the system/device clock to ensure the accurate timestamp in the audit logs.

ControlSecurity Level
IDDescriptionHighMediumLow
LM.B.01Synchronize the clock to the University’s time servers (ntp.umn.edu) or a trusted external time sourceRequired
Effective July 2019
Required
Effective July 2019
Required
Effective July 2019

Protection of Log Information

The following table defines the baseline security controls to protect the log information from unauthorized access, tampering, and operational problems with logging.

ControlSecurity Level
IDDescriptionHighMediumLow
LM.C.01For multi- user system (servers): Use a logging service that maintains the confidentiality, integrity, and non-repudiation of the logs1RequiredRequiredRecommended
LM.C.01For single-user systems or network infrastructure: Use a logging service that maintains the confidentiality, integrity, and non-repudiation of the logs1Required
Effective July 2019
Required
Effective July 2019
Recommended
LM.C.02For multi-user systems (servers): Control access to the log files to a limited group of authorized personnel. Type of access include write, delete, truncate, or modifyRequiredRequiredRecommended
LM.C.02For single user systems and network infrastructure: Control access to the log files to a limited group of authorized personnel. Type of access include write, delete, truncate, or modifyRequired
Effective July 2019
Required
Effective July 2019
Recommended
LM.C.03Monitor for modifications to the log filesRequired
Effective July 2019
Required
Effective July 2019
Recommended
LM.C.04Monitor for alterations to the log configuration (e.g., events recorded, remote logging)Required
Effective July 2019
Required
Effective July 2019
Recommended
LM.C.05Manage storage capacity of the log files to avoid exceeding capacity and meet retention requirementsRequired
Effective July 2019
Required
Effective July 2019
Recommended
LM.C.06Monitor event logging for continued operationRequired
Effective July 2019
Required
Effective July 2019
Recommended
LM.C.07Redact non-essential sensitive information, including private data from the logs prior to sharing with vendor or others for troubleshooting, unless contractually protectedRequired
Effective July 2019
Required
Effective July 2019
Required
Effective July 2019
LM.C.08Obtain approval from the CISO to share logs beyond the scope of troubleshootingRequired
Effective July 2019
Required
Effective July 2019
Recommended

1 Required by PCI DSS for all systems that store, process or transmit cardholder data, or support the credit card processing environment.

Log Retention

The following table defines the baseline security controls for log retention.

ControlSecurity Level
IDDescriptionHighMediumLow
LM.D.01For multi-user systems (servers): Retain and readily available for minimum durationRequired - 90 daysRequired - 30 daysRequired - 30 days
Effective July 2019
LM.D.02For multi-user systems (servers): Retain logs in off-line storageRequired - 1 yearRequired - 90 daysOptional
LM.D.03For single-user systems: Retain and readily available for minimum durationRequired - 14 days1
Effective July 2019
Required - 14 daysRequired - 14 days
LM.D.04For single-user systems: Retain logs in off-line storageRecommended - 90 days2Recommended - 90 daysOptional
LM.D.05For network infrastructure: Retain and readily available for minimum durationRequired - 30 days1
Effective July 2019
Required - 10 daysRequired - 10 days
LM.D.06For network infrastructure: Retain logs in off-line storageRequired – 90 days
Effective July 2019
Required - 90 days
Effective July 2019
Optional

1 PCI DSS requires 90 days for all systems or applications that store, process, or transmit cardholder data, or support the credit card processing environment.

2 PCI DSS requires 1 year for all systems or applications that store, process, or transmit cardholder data, or support the credit card processing environment.

Log Analysis

The following table defines the baseline security controls for security log analysis for multi-user systems.

ControlSecurity Level
IDDescriptionHighMediumLow
LM.E.01Periodically review the severity level assigned to anomalies included in log analysis. See security threat map for anomaly guidance (suggest: annual) See Security Threat Map (google doc)Required
Effective July 2019
Required
Effective July 2019
Recommended
LM.E.02Monitor and assess high severity anomaliesRequired - within 72 hours1
Effective July 2019
Required – Weekly
Effective July 2019
Recommended - Weekly
LM.E.03Review and prioritize other anomalies for remediationRecommended – within 72 hours2RecommendedOptional
LM.E.04For multi-user systems (servers): Document actions taken (including remediation) for high severity anomaliesRequiredRequiredRecommended
LM.E.04For single-user systems and network infrastructure: Document actions taken (including remediation) for high severity anomaliesRequired
Effective July 2019
Required
Effective July 2019
Recommended
LM.E.05For multi-user systems (servers): Document actions taken (including remediation for other anomalies)RequiredRecommendedRecommended
LM.E.05For single-user systems and network infrastructure: Document actions taken (including remediation for other anomalies)Required
Effective July 2019
RecommendedRecommended

1 PCI DSS requires within 24 hours for all systems or applications that store, process, or transmit cardholder data, or support the credit card processing environment.

2 Required for health information, HIPAA or ePHI, or where specified in a contractual agreement. For PCI DSS required within 24 hours, this includes systems/devices that store, process, transmit, or have the ability to impact the security of credit cardholder data.

Resources Covered

This applies to IT resources owned or contracted by the University.

Individuals Covered

This applies to University community members who use or manage University IT resources.

Related Information

Published Date

November 2014

Last Reviewed

April 2019