Skip to main content

Log Data

Description

Log Data includes system, network, and application logs collected from all infrastructure and platform components within Scheol Lab.
It enables monitoring, auditing, and detection of security events and operational anomalies.


Asset Identification

AttributeValue
Asset IDDAT-LOG-01
CI TypeInformation
Asset NameLog Data
Asset CategorySecurity Monitoring
OwnerSecurity Role (Sec)
StatusPlanned
LocationLogging & Monitoring Platform
Primary FunctionSecurity monitoring, audit, and alerting

Asset Dependencies

Dependency TypeAssetStatus
PlatformLogging & Monitoring PlatformPlanned
PlatformIdentity Management PlatformPlanned
InformationInfrastructure Configuration DataIn Progress

Relationships

RelationshipTarget CI
SupportsSecurity Monitoring & Detection
SupportsIncident Response Processes
UsesInfrastructure Configuration Data

Asset Classification

CriteriaLevel
Confidentiality🟨 Medium
Integrity🟥 High
Availability🟨 Medium

Criticality score: 🟥 High

Rationale:

  • Integrity is critical to ensure logs cannot be tampered with.
  • Confidentiality is moderate, sensitive information may appear in logs.
  • Availability is important for detection but tolerates short delays.

Responsibilities

RoleResponsibility
Security Role (Sec)Collection, monitoring, and protection of logs
Operations Role (Ops)Ensure log forwarding and storage infrastructure availability

Security Controls

  • Centralized logging with access control
  • Integrity checks and tamper detection
  • Encryption of logs in transit and at rest
  • Retention policies aligned with operational and regulatory requirements

Security Considerations

Main risks include:

  • Log tampering or deletion
  • Unauthorized access to sensitive log content
  • Loss of visibility due to misconfigured logging

Mitigations:

  • Role-based access control
  • Automated monitoring and alerting
  • Secure storage and backups

Methodological References:

  • ISO 27001 - Control 8.2 Privileged access rights ; Control 8.15 Logging ; Control 8.16 Monitoring activities.
  • NIST CSF - DE.CM Continuous Monitoring ; PR.PT Protective Technology.
  • EBIOS RM - Logs considered as critical information assets supporting threat detection and risk analysis.