Security Log Collection, Analysis, and Retention

Standard number: DS-19
Date issued: 7/1/2018
Date last reviewed: 7/1/2018
Date of next review: 6/30/2024
Version: 1.0
Approval authority: Vice President for Information Technology and CIO
Responsible office: Information Assurance

This Standard supports and supplements the Information Security (SPG 601.27) policy. It will be periodically reviewed and updated as necessary to meet emerging threats, changes in legal and regulatory requirements, and technological advances.

I. Overview

In order to appropriately protect U-M information and systems, as well as support other information and system operation functions, it is necessary for campus units to appropriately generate, store, and analyze logs that record events occurring within U-M systems and networks. Security software, operating system, and application log data are critical components in detecting, analyzing, preventing, and responding to potential information security incidents including unauthorized data disclosures, and activities on U-M systems.

The key objectives of this Standard are to:

Other federal or state regulations or contractual agreements may require additional actions that exceed those included in this Standard.

II. Scope

This standard applies to the Ann Arbor campus, Michigan Medicine, UM-Dearborn, UM-Flint, all affiliates, and all faculty, staff, workforce members, and sponsored affiliates. It further applies to

III. Roles and Responsibilities

Information Assurance (IA)

University Units

IV. Standard

Security logs are records of events occurring within the university’s systems and networks. A security log captures information associated with information security-related events.

Specifically, security logs:

Examples of security software logs include (non-exhaustive): Antivirus; intrusion prevention system; vulnerability management; authentication servers; firewalls; routers.

Examples of operating systems and application logs include (non-exhaustive): System events; audit records.

Security logs, which capture information associated with security events and may contain personally identifiable information about the users of information resources, are a type of IT security information and are classified as High data.

Logging must be enabled at the operating system, application and database, and device levels when data classified as Restricted, High, and Moderate are created, processed, maintained, transmitted, or stored. It is recommended that logging is enabled for systems, applications, and databases that maintain data classified as Low.

Individual faculty members that maintain student records (FERPA data) on their own devices, whether or not university-maintained, are exempt from this requirement.

All log data for systems, devices, and applications must be collected and stored as outlined below and summarized in Table 1, as well as in the more detailed guidance and procedures on Safe Computing in Security Log Management.

Table 1. Logging Configuration Settings by Data Classification Levels

Category Restricted High Moderate Low
How long to retain log data 1 year (PCI); 180 days for all other data 3 years (HIPAA data maintained by Michigan Medicine); 180 days (all other units); 180 days for all other data 90 days (where feasible) Not Required
Logging enabled (except endpoints) Required Required Required Recommended
Endpoint Logging (workstation, desktop) Required Recommended Recommended Recommended
Automated Logging Failure Alerts Required Required Recommended Recommended
Local logs to be sent to IA log management infrastructure Required Required Recommended Recommended
Maximum allowed delay of transfer of log data to IA log management infrastructure 5 minutes 30 minutes

Log Configuration and Management