Standard: S-11 Responsible Executive: Vice President for Information Technology and Chief Information Officer Responsible Office: Office of the Vice President for Information Technology Date Issued: May 1, 2018 Date Last Revised: December 12, 2024
ContactsIndividuals and Entities AffectedStatement of StandardResponsibilitiesDefinitions (defined terms are capitalized throughout the document)Related Documents, Forms and ToolsHistory and UpdatesAppendix
Purdue Systems Security (PSS)itpolicyanswers@purdue.edu
All Purdue University centralized and departmental IT units and the associated IT Resources under their control or support, including IT Resources that may be hosted or managed by a third party on behalf of the University. This standard also covers individually-managed IT Resources if Sensitive or Restricted Data is stored, processed or transmitted by the system.
Operating system and application Logging is an essential information security control that is used to 1) identify, monitor, respond to, and prevent operational problems, security incidents, policy violations, and fraudulent activity; 2) optimize system and application performance; 3) assist in business recovery activities; and 4) comply with federal, state, and local laws and regulations and industry-specific requirements. This standard identifies minimum Logging requirements to generate appropriate Logs and integrate with the University’s Log management functions.
All IT units must follow this standard in accordance with the policy on Information Security and Privacy (VII.B.8) and may issue additional guidelines, procedures, or other requirements as necessary to support this standard. Compliance with this standard may be verified through various methods, including but not limited to, system configuration review, Log management system review, internal and external audits, and automated reporting mechanisms.
Implementation of the requirements in this standard applies to any system that handles Sensitive or Restricted Data and new deployments of all systems as of one year from the issuance of this standard.
Requests for any exception to this standard must follow the Security Policy Exception Procedures.
Where technically possible and when not in conflict with regulatory or contractual requirements, systems must record and retain audit Log records of the following events:
When Logging the above events, sufficient information must be captured to answer the following questions:
The following information must NEVER be included in Logs:
The system must support the formatting and storage of audit Logs in such a way as to ensure the integrity of the Logs and to support analysis and reporting.
Log data must be retained for a minimum period of three (3) months immediately available for analysis (e.g., online, archived or restorable from backup). Refer to the section on Additional Requirements for Systems with Sensitive/Restricted Data for retention periods pertaining to those systems.
Mechanisms to support these goals include but are not limited to the following:
Audit Logs are subject to regular periodic review as required by the criticality of the IT Resource and the underlying Information Assets. Factors influencing frequency of Log review include:
Security Information and Event Management (SIEM) or other solutions incorporating event thresholds and providing alerts may be used to facilitate monitoring and review processes.
Detection of suspicious activity or discovery of prohibited Sensitive or Restricted Data recorded in Logs must be reported and handled in a manner consistent with the University’s policy on IT Security Incident Response (S-17).
Logging facilities and Log information must be protected against tampering, modification, destruction and unauthorized access. Controls must be in place to prevent alteration or to detect and alert on alteration to Log information. Ensure processes are in place to detect whether Logging has stopped. Logs transmitted over open, public or untrusted networks must use a secure transmission protocol.
Access to Log information is subject to the policy on Acceptable Use of IT Resources and Information Assets (VII.A.4) and the Data Classification and Handling Procedures. Inadvertent or improper disclosure of Log data may be harmful to the security and privacy of University Information Assets and IT Resources and must be reported and handled in a manner consistent with the policy on Security Incident Response (S-17).
All systems that store, process, transform and transmit Sensitive and Restricted Data have a higher level of criticality and a greater need for additional security controls for audit Log data. Where technically possible, audit Logs from information systems with Sensitive or Restricted Data may be forwarded to a Centralized Log Management System that includes Log retention, parsing and alerting capabilities. Log review must occur daily through either manual or automated means.
Logs from systems with Sensitive and/or Restricted Data must be retained for at least one year, with a minimum of three months immediately available for analysis. Additionally, audit Logs must be retained for the period as required by any applicable law, regulation, contractual obligation, or as required by internally-imposed retention periods that may be extended beyond what regulations require or beyond the minimum of one year as required by this standard.
Centralized and Departmental IT Units, IT Resource Owners and Their Designees
Data Stewards
Information Owners and Their Designees
PSS
All defined terms are capitalized throughout the document. Additional defined terms may be found in the central Policy Glossary.
Centralized Log Management SystemA Logging solution that collects Log data from multiple systems, often from multiple locations, to one central storage location to ease enforcement of retention policies and facilitate Log review, security event correlation, alerting and response.
Controlled Unclassified Information (CUI)As established by Executive Order 13556, unclassified information that requires safeguarding or dissemination controls pursuant to federal law, regulation or government-wide policy.
Data StewardSee definition in the policy on Information Security and Privacy (VII.B.8).
Information AssetSee definition in the policy on Information Security and Privacy (VII.B.8).
Information OwnerSee definition in the policy on Information Security and Privacy (VII.B.8).
IT ResourceSee definition in the policy on Information Security and Privacy (VII.B.8).
IT Resource OwnerAny person, IT unit or department assigned to or otherwise providing the administrative and physical control and technical support of IT Resources, either on campus or otherwise using University resources, or providing the oversight of third-party hosted or managed IT Resources.
Log (Logging) A record of (or the act of recording) events describing activity within a computing system, network or application.
Restricted Data Information protected because of protective statutes, policies or regulations; or information for which the Information Owner has exercised their right to restrict access. Examples include, but are not limited to, student education records, non-directory information, Social Security numbers, protected health information, bank account information, credit card numbers, and Controlled Unclassified Information (CUI).
Sensitive Data Information whose access must be guarded due to proprietary, ethical or privacy considerations even though there may not be a civil statute requiring this protection. Examples: fixed asset details, PUID, electronic or paper admissions applications.
Security Information and Event Management (SIEM)Security information and event management software providing centralized Logging for different types of Log sources and may perform Log normalization, analysis and event filtering.
This standard is issued in support of the policy on Information Security and Privacy (VII.B.8), as amended or superseded.
Other related policies and procedures:
CIS Benchmarks
NIST Special Publication 800-92 – Guide to Computer Security Log Management
NIST Special Publication 800-171 – Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations
Executive Order 13556 – Controlled Unclassified Information
December 12, 2024: Document reviewed; minor administrative updates made to titles, offices and links.
May 1, 2018: This standard supersedes the policy on IT Resource Logging (VII.B.5) dated November 18, 2011, and the Basic Logging Standard issued March 1, 2010.
See policy VII.B.5 in the policy e-archive for further history.
There are no appendices to this standard.