Application Centralized Logging
Introduction
During an IT security incident, logs help determine what happened and when. Attackers often delete or modify local logs, so the IT Security Office requires remote, centralized logging for all medium and high risk applications.
Procedure
- Meet the Standard for Information Technology Logging requirements.
- Forward logs to University Central or an IT Security Office authorized log server.
- Log servers should forward logs to the University Central log server.