Skip to main content

Logging & Monitoring Platform

Description

The Logging & Monitoring Platform collects, aggregates, and analyzes system, network, and application logs within the Scheol Lab environment. It supports security monitoring, incident detection, and operational visibility across infrastructure and services.


Asset Identification

AttributeValue
Asset IDPLT-LGM-01
CI TypePlatform
Asset NameLogging & Monitoring Platform
Asset CategorySecurity Monitoring
OwnerSecurity Role (Sec)
StatusPlanned
LocationProxmox VM / Container
Primary FunctionCentralized logging, alerting, and monitoring

Asset Dependencies

Dependency TypeAssetStatus
PlatformProxmox Virtualization PlatformPlanned
PlatformNetwork Security PlatformPlanned
InformationLog DataPlanned
PlatformIdentity Management PlatformPlanned

Relationships

RelationshipTarget CI
MonitorsProxmox Host and all deployed services
Collects data fromNetwork Security Platform, Automation Platform, Identity Management Platform
SupportsRisk detection, security dashboards, alerts
Depends onIdentity Management Platform for access control

Asset Classification

CriteriaLevel
Confidentiality🟨 Medium
Integrity🟥 High
Availability🟥 High

Criticality score: 🟥 High

Rationale:

  • Integrity is critical because tampered logs could hide malicious activity.
  • Availability is critical for timely detection and response.
  • Confidentiality is medium: log data may contain sensitive information.

Responsibilities

RoleResponsibility
Security Role (Sec)Deploy, configure, and maintain logging and monitoring tools
Operations Role (Ops)Ensure proper data collection from infrastructure and services
Development Role (Dev)Integrate applications with monitoring and alerting mechanisms

Security Controls (High-Level)

  • Access control for monitoring interfaces
  • Log integrity protection (hashing, signing)
  • Alerting for suspicious events
  • Network segmentation to protect log servers
  • Regular review and audit of collected logs

Security Considerations

Main risks associated with this asset include:

  • Tampering or deletion of logs
  • Unauthorized access to monitoring dashboards
  • Misconfiguration leading to missed alerts or false positives
  • Performance degradation impacting data collection

Mitigation measures:

  • Restrict access via RBAC and MFA
  • Implement log integrity checks
  • Regular monitoring of alert rules and dashboard accuracy
  • Isolate monitoring infrastructure from public-facing services

Methodological References:

  • ISO 27001 - Control 8.3 Information access restriction ; Control 8.15 Logging ; Control 8.16 Monitoring activities.
  • NIST CSF - DE.CM Continuous Monitoring ; PR.PT Protective Technology.
  • EBIOS RM - Logging and monitoring platforms as detection and investigation assets.