Logs
Use of log management system
Summary The log management must be made by the operating system or by an external system separated from the application. Description Log management brings several benefits to an organization. The records of events or transactions can be valuable for ...
Store logs based on valid regulation
Summary The organization must store logs, at least, from the ocurrency of the event on the system to the time stipulated by valid regulation for that specific system. Description The organization must take into account the regulations that apply to ...
Register severity level
Summary The system must register the severity level for each exceptional and security event. Description The system must implement a rigorous log methodology. Event logging is a fundamental practice in information security and system monitoring. It ...
Avoid excessive logging
Summary The system must not register unnecessary information when logging exceptional events. Description While event logging is generally a good security practice, the organization must consider that using high logging levels is only appropriate for ...
Allow session history queries
Summary The system must allow authorized users to inspect their own session history. Description Systems usually collect personal and transactional data from their users. Users should have control of their own data and, as such, should be allowed to ...
Allow transaction history queries
Summary The system must allow authorized users to inspect their own transaction history. Description Systems usually collect personal and transactional data from their users. Users should have control of their own data and, as such, should be allowed ...
Avoid logging sensitive data
Summary The system must not register sensitive information when logging exceptional events. Description While event logging is generally a good security practice, the organization must consider that using high logging levels is only appropriate for ...
Prevent log modification
Summary System logs must not allow modifications or alterations. Description Logs are used to analyze a system's behavior. They help detect errors and suspicious activity, and often hold very sensitive information. Therefore, they should be protected ...
Record exact occurrence time of events
Summary The system must log the exact occurrence time (date, hour, seconds, milliseconds and time zone) for each exceptional and security event. Description Event logs must contain the exact time of occurrence in order to allow backtracking in an ...
Disable debugging events
Summary The organization must disable debugging events in production. Description Debugging features are essential during the development phase to identify and fix issues in the code. However, these debugging tools and events should not be active or ...
Avoid disclosing technical information
Summary The application must not disclose internal system information such as stack traces, SQL sentence fragments, database names or table names. Description Applications should fail safely whenever an unexpected event occurs. Error message ...
Record exceptional events in logs
Summary The system must register all exceptional and security events in logs. Description The organization must properly record the exceptional and security events in duly protected logs (confidentiality), considering that an event of this type ...