Topics: 

PS-08-022 Security Log Management

Issue Date: 3/20/2008

Effective Date:  3/20/2008

Review Date: 12/1/2023

PURPOSE

Developing, implementing and maintaining effective log management practices throughout an enterprise helps ensure that computer security events (actions of users, malicious activity and operational trends) are recorded and stored in sufficient detail and for an appropriate period of time as required by agency, state or federal regulation.  Additionally, agencies with federal partners are subject to laws and regulations such as FISMA, GLBA, PCI and HIPAA that require or strongly recommend storage and review of certain logs.  This policy establishes the requirement to implement log management practices for State information systems.

SCOPE and AUTHORITY

O.C.G.A 50-25-4(a)(10) – State Government, Georgia Technology, General Powers

O.C.G.A 50-25-4(a)(21) - State Government, Georgia Technology, General Powers

PM-04-001 – Information Technology Policies, Standards and Guidelines

PS-08-005 – Enterprise Information Security Charter

TERMS AND DEFINITIONS

Log - a record of the events occurring within an organization’s systems and networks.

Computer Security Log Management - the processes for generating, transmitting, storing, analyzing and disposing of computer security log data.

Log Management Infrastructure - consists of the hardware, software, networks, and media used to generate, transmit, store, analyze, and dispose of log data.

POLICY

Agencies that operate and control State of Georgia information systems shall establish internal policies and procedures for creation, protection and retention of computer security logs and implement a log management infrastructure.

RELATED ENTERPRISE POLICIES, STANDARDS, GUIDELINES

Log Management Infrastructure (SS-08-036)

REFERENCES

NIST 800-92 Guide to Computer Security Log Management