6.4: Ensure Adequate Storage for Logs

Ensure that all systems that store logs have adequate storage space for the logs generated.

Asset Type

Security Function

Implementation Groups

Network

Detect

2, 3

Dependencies

  • Sub-control 1.5: Maintain Asset Inventory Information

Inputs

  1. The list of endpoints (subject to system logging configuration)

  2. The organization’s logging configuration policy, outlining log rotation policy, maximum log storage size, etc.

Operations

  1. For each endpoint, collect the system logging configuration

Measures

  • M1(i) = (For each endpoint “i”) 1 if an endpoint’s logging configuration complies with the organizations logging policy; 0 otherwise.

  • M2 = The number of endpoints from Input 1

  • M3 = List of compliant endpoints

  • M4 = List of non-compliant endpoints

Metrics

Logging Storage Coverage

Metric

The ratio of endpoints compliant with the organization’s logging policy to the total
number of endpoints.

Calculation

(SUM from i=1..M2 (M1(i))) / M2