Asset & Data Management · AD-Q07

Question: Are logging, monitoring, and retention requirements defined for critical systems and data stores?

Objective — Why This Matters

Without consistent logs and retention, investigations stall and compliance evidence is lost. Defining “what to log, how long, and where” enables detection and audit readiness.

Maturity Levels (0–5)

0 — Unaware
Logging defaults; no central collection or retention rules.
1 — Ad Hoc
Some systems forward logs; formats and retention vary.
2 — Defined
Logging standard (events, formats, retention) for critical assets.
3 — Managed
Centralized collection with access controls; retention per class.
4 — Integrated
Dashboards and alerts mapped to risks; immutable storage for key logs.
5 — Optimized
Use cases tuned by incident learnings; retention balanced with cost and regulation.

How to Level Up

From → To Actions
0 → 1 Define must-have events for critical systems; enable forwarding.
1 → 2 Approve logging standard (schema, timestamps, retention per class).
2 → 3 Centralize logs; restrict access; document queries/dashboards.
3 → 4 Add WORM/immutable storage for high-value evidence; alert on key events.
4 → 5 Review detections quarterly; tune retention with cost/risk analysis.

People / Process / Technology Enablers

Evidence Required

Metrics / KPIs

Low-Cost / Open-Source Options (MSME)

Purpose Tool Notes
Collection Fluent Bit / Filebeat Lightweight agents; JSON where possible.
Store OpenSearch / Loki Start with a narrow scope; protect access.
WORM S3 Object Lock / MinIO immutability Evidence-grade retention.

Common Pitfalls

Compliance Mapping

Standard Clauses / Notes
ISO/IEC 27001 A.8.15 (logging), A.5.10 (records).
NIST CSF 2.0 DE.CM-1/7, PR.PT-1.
CERT-In 2022 Log retention expectations.
NIRMATA Scoring AD-Q07 Level ≥3 requires centralization + retention matrix + evidence.