Log Management: The Complete Guide for Compliance and Security Teams
2026-03-08
By Emre Salmanoglu

Log Management: The Complete Guide for Compliance and Security Teams

Learn how to implement log management that satisfies ISO 27001, SOC 2, NIS2, and DORA requirements. Covers log collection, retention, analysis, SIEM integration, and compliance evidence.

log management
logging
SIEM
audit trail
compliance

What Is Log Management?

Log management is the systematic practice of collecting, centralising, storing, and analysing log data generated by systems, applications, and network devices across an organisation's IT environment. Logs provide the audit trail that enables security monitoring, incident investigation, compliance evidence, and operational visibility.

For compliance-driven organisations, log management is a foundational control required by ISO 27001, SOC 2, NIS2, and DORA to demonstrate that security events are recorded, monitored, and available for audit.

Log Sources

SourceLog TypesExamples
Operating systemsAuthentication, system events, process executionWindows Event Log, Linux syslog/journald
ApplicationsUser actions, transactions, errorsWeb server logs, application audit logs
Network devicesTraffic flows, firewall rules, DNS queriesFirewall logs, proxy logs, flow data
Cloud platformsAPI calls, resource changes, IAM eventsAWS CloudTrail, Azure Activity Log, GCP Audit
Security toolsAlerts, detections, scan resultsEDR, vulnerability scanners, WAF
DatabasesQueries, schema changes, admin operationsAudit logs, slow query logs
Identity systemsAuthentication, MFA, SSO eventsIdP logs, Active Directory events

Log Management Architecture

ComponentFunctionExamples
Collection agentsGather logs from sourcesFluentd, Filebeat, rsyslog, cloud-native agents
TransportSecurely transmit logs to central platformKafka, AWS Kinesis, syslog-TLS
ProcessingParse, normalise, enrich log dataLogstash, Fluentd, cloud ETL pipelines
StorageStore logs with appropriate retentionElasticsearch, S3, Azure Blob, Splunk
AnalysisSearch, correlate, and visualise logsKibana, Splunk, Grafana, cloud analytics
AlertingReal-time notification on critical eventsSIEM rules, CloudWatch Alarms, PagerDuty

Log Retention Requirements

FrameworkMinimum RetentionRecommended Retention
ISO 27001Risk-based (typically 12 months)1-3 years
SOC 2Audit period (12 months)1-2 years
NIS2Sufficient for investigation12-18 months
DORA5 years for ICT incidents5 years
GDPRProportionate to purpose6-12 months for access logs
PCI DSS12 months (3 months immediately available)12 months

Essential Log Events

Event CategoryWhat to LogWhy
AuthenticationAll login attempts (success and failure)Detect brute force, credential stuffing
AuthorisationAccess grants, denials, privilege escalationDetect unauthorised access
Data accessAccess to sensitive data and systemsAudit trail for data protection
Configuration changesSystem, network, and application changesDetect unauthorised modifications
Administrative actionsAll privileged operationsAccountability for admin activities
Security eventsAlerts, policy violations, anomaliesSecurity monitoring and response
Error conditionsApplication errors, system failuresOperational monitoring and incident detection

Compliance Requirements

Framework Mapping

RequirementISO 27001SOC 2NIS2DORA
Event loggingA.8.15CC7.2Art. 21(2)(g)Art. 10(2)
Log protectionA.8.15CC7.2Art. 21(2)(g)Art. 10(2)
Clock synchronisationA.8.17CC7.2Art. 21(2)(g)Art. 10(2)
Log reviewA.8.15CC7.2Art. 21(2)(b)Art. 10(1)
Log retentionA.8.15CC7.2Art. 21(2)(g)Art. 10(2)
Administrator loggingA.8.15CC6.3Art. 21(2)(i)Art. 9(4)

Audit Evidence

Evidence TypeDescriptionFramework
Logging policyDocumented policy defining what is logged and how longAll frameworks
Log source inventoryList of all systems sending logs with coverage gapsAll frameworks
Retention configurationEvidence of log retention settings matching policyAll frameworks
Log integrity controlsDocumentation of tamper protection mechanismsAll frameworks
NTP configurationEvidence of time synchronisation across all systemsISO 27001, SOC 2
Log review proceduresDocumented process for regular log reviewAll frameworks
Access control evidenceProof that log access is restricted appropriatelyAll frameworks

Common Mistakes

MistakeRiskFix
Logging everything without strategyExcessive cost, alert fatigue, compliance gapsDefine logging requirements by use case and compliance need
No log integrity protectionLogs can be tampered with, undermining audit valueUse immutable storage, cryptographic hashing, centralised collection
Inconsistent timestampsCannot correlate events across systemsImplement NTP synchronisation, monitor for clock drift
No log review processLogs collected but never analysedEstablish daily automated alerts and weekly manual review
Insufficient retentionLogs deleted before investigation or audit needs themAlign retention with longest applicable framework requirement
Logging sensitive dataPII or credentials in logs create additional compliance burdenMask or redact sensitive fields before storage

How Orbiq Supports Log Management Compliance

Orbiq helps you demonstrate log management controls:

  • Evidence collection — Centralise logging policies, retention configurations, and review procedures
  • Continuous monitoring — Track logging coverage and retention compliance
  • Trust Center — Share your logging and monitoring posture via your Trust Center
  • Compliance mapping — Map logging controls to ISO 27001, SOC 2, NIS2, and DORA
  • Audit readiness — Pre-built evidence packages for auditor review

Further Reading