HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.110 Data privacy guidelines for logging procedures

S 2.110 Data privacy guidelines for logging procedures

Initiation responsibility: Head of IT Section, data privacy officer

Implementation responsibility: Administrators, data privacy officer

In terms of data security, logging as part of IT-systems operation constitutes the manual or automatic generation of records which make it possible to determine "who accessed or performed what, when, using which resources." These records should also indicate system states, i.e. "who had which access rights for which period of time."

The nature and scope of logging depends on general data privacy laws as well as locally applicable guidelines.

The logging of administrative activities is equivalent to system monitoring, while the logging of user activities serves essentially as process monitoring. Accordingly, requirements concerning the nature and scope of system-oriented logging originate primarily from general data privacy laws, while process-oriented logging is defined mainly by locally applicable guidelines. Examples of process-oriented logging guidelines are registration laws, police laws and constitutional laws.

Minimum requirements for logging

The following activities must be logged fully during the administration of IT systems:

During the processing of person related data, the following user activities must be logged selectively or fully in accordance with the sensitivity of the processes and information involved:

Appropriation of log data

In accordance with the almost fully identical data privacy regulations applicable on the federal and state levels, log data are largely immune to appropriation (e.g. § 14 Sec. 4 and § 31 BDSG, § 13 Abs. 5 HDSG). Such data must only be used for the purposes for which they were originally saved. These purposes usually consist of general monitoring tasks specified in a security concept, "checks for the proper usage of programs for processing person related data" stipulated by most data security laws (for example, refer to § 18 Sec. 2 BDSG, § 8 Abs. 3 LDSG-SH) and monitoring by internal or external data security officers. Only in exceptional cases do locally applicable regulations allow the appropriation of such data for other purposes such as criminal prosecution.

Storage period

Unless specified otherwise by locally applicable regulations, the storage period for logs is defined by the deletion guidelines forming part of generally applicable data privacy laws. The "fulfilment of responsibilities" is used as a yardstick here. If no compelling reasons exist for the further retention of log data, these must be deleted by law (for example, refer to § 20 Sec. 2 BDSG).

The following factors serve as orientation here:

Empirical results have shown that a retention period of one year is sufficient here.

Shorter retention periods should be considered for logs which are prepared for the purpose of selective checks. Storage up to the point of actual checking is usually adequate. Here, too, locally applicable regulations must be observed.

Basic technical and organisational requirements

The effectiveness of logging and its evaluation as part of monitoring depends decisively on technical and organisational conditions. In this context, the following aspects should be considered:

.
© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home