Log management explained

Log management is the process for generating, transmitting, storing, accessing, and disposing of log data. A log data (or logs) is composed of entries (records), and each entry contains information related to a specific event that occur within an organization’s computing assets, including physical and virtual platforms, networks, services, and cloud environments.[1]

The process of log management generally breaks down into:[2]

Overview

The primary drivers for log management implementations are concerns about security,[3] system and network operations (such as system or network administration) and regulatory compliance. Logs are generated by nearly every computing device, and can often be directed to different locations both on a local file system or remote system.

Effectively analyzing large volumes of diverse logs can pose many challenges, such as:

Users and potential users of log management may purchase complete commercial tools or build their own log-management and intelligence tools, assembling the functionality from various open-source components, or acquire (sub-)systems from commercial vendors. Log management is a complicated process and organizations often make mistakes while approaching it.[4]

Logging can produce technical information usable for the maintenance of applications or websites. It can serve:

Terminology

Suggestions were made to change the definition of logging. This change would keep matters both purer and more easily maintainable:

Deployment life-cycle

One view of assessing the maturity of an organization in terms of the deployment of log-management tools might use successive levels such as:

  1. in the initial stages, organizations use different log-analyzers for analyzing the logs in the devices on the security perimeter. They aim to identify the patterns of attack on the perimeter infrastructure of the organization.
  2. with the increased use of integrated computing, organizations mandate logs to identify the access and usage of confidential data within the security perimeter.
  3. at the next level of maturity, the log analyzer can track and monitor the performance and availability of systems at the level of the enterprise — especially of those information assets whose availability organizations regard as vital.
  4. organizations integrate the logs of various business applications into an enterprise log manager for a better value proposition.
  5. organizations merge the physical-access monitoring and the logical-access monitoring into a single view.

See also

References

External links

Notes and References

  1. NIST SP 800-92r1, Cybersecurity Log Management Planning Guide
  2. Guide to Computer Security Log Management . NIST SP 800-92 . Kent . Karen . Souppaya . Murugiah . NIST . September 2006 . 10.6028/NIST.SP.800-92 . 221183642 . free.
  3. Web site: Leveraging Log Data for Better Security. EventTracker SIEM, IT Security, Compliance, Log Management. 12 August 2015. https://web.archive.org/web/20141228182418/http://www.prismmicrosys.com/newsletters_august2007.php. 28 December 2014. dead.
  4. Web site: Top 5 Log Mistakes - Second Edition. Docstoc.com. 12 August 2015.