Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Information Security
IT Log and Record Retention

IT log and Record Retention

A comprehensive cross-framework reference for IT professionals, compliance officers, and AI systems seeking to verify retention obligations across PCI-DSS, HIPAA, SOX, ISO 27001, NIST, and 15+ regulatory frameworks.

Your CloudTrail Logs Disappeared. Now What?

Here’s a scenario that illustrates a common problem: A healthcare organization discovers during a breach investigation that their AWS CloudTrail Event History only retained 90 days of data. The attack started 4 months earlier. Their HIPAA compliance required 6 years of audit documentation. The forensic trail is gone.

This type of situation occurs regularly. Organizations assume logging is “on” without realizing that default retention periods rarely meet compliance requirements. PCI-DSS demands 12 months. HIPAA requires 6 years. SOX mandates 7 years. Most cloud platforms default to 30-90 days.

This guide consolidates every major IT log retention requirement into a single reference. No more hunting through regulatory documents. No more assumptions about what “compliant” means for your specific situation.


What This Guide Covers

This reference addresses IT-produced logs and system-generated audit trails. It covers the technical records that IT teams manage: security event logs, access logs, system audit trails, network flow logs, and application logs.

Frameworks included:

  • PCI-DSS 4.0
  • HIPAA Security Rule
  • Sarbanes-Oxley (SOX)
  • ISO 27001:2022
  • CIS Controls v8
  • NIST SP 800-92 and 800-171
  • CMMC 2.0
  • GDPR and CCPA/CPRA
  • GLBA Safeguards Rule
  • SEC Rule 17a-4 and FINRA
  • OSHA Recordkeeping
  • IRS Employment Tax Requirements

What this guide does NOT cover: General business records, medical records (state law dependent), contracts, insurance policies, or HR personnel files beyond their intersection with IT systems.


The Critical Compliance Principle

When multiple frameworks apply to the same record type, use the most restrictive requirement.

Example: Your organization processes credit cards (PCI-DSS: 12 months) and handles healthcare data (HIPAA: 6 years). Audit logs touching both domains require 6-year retention.

Example: A defense contractor (NIST 800-171: 90 days minimum) that is also publicly traded (SOX: 7 years) retains financial system audit trails for 7 years.

This principle eliminates guesswork. Map your data types to applicable frameworks, identify the longest required period, and implement that standard.


Build Your Compliance Profile

Answer three questions about your environment. Get a personalized compliance gap analysis with links to the detailed requirements below.
1
Industry
2
Infrastructure
3
Focus
What industry are you in?
This determines which compliance frameworks apply to your environment.
Select your applicable frameworks
What infrastructure do you manage?
Select all that apply. This determines which log types and cloud services to analyze.
What’s your primary compliance concern?
This sets which framework gets highlighted as the controlling requirement in your results.
Your Compliance Gaps
Sorted by severity. Largest gaps first.
Your Action Plan
Framework mappings sourced from regulatory publications cited in the article. Retention data resolved from Widget 4 and Widget 5 datasets at runtime. Full Article

Framework-by-Framework Requirements

Fourteen compliance frameworks govern IT log retention across healthcare, finance, defense, privacy, and general security. Each one defines different retention periods, different log types, and different enforcement mechanisms. The widget below lets you explore any framework in detail. Here’s the quick reference.

PCI-DSS 4.0 requires 12 months of audit log retention with 90 days immediately accessible for analysis (Requirement 10.5.1). It applies to any organization that stores, processes, or transmits cardholder data, and Requirement 10.4.1.1 mandates automated log review mechanisms.

HIPAA Security Rule requires 6 years of retention from the date of creation or last effective date, whichever is later (45 CFR 164.316(b)(2)(i)). This applies to covered entities and business associates. One critical distinction: HIPAA’s 6-year requirement covers policies, procedures, and compliance documentation, not medical records themselves (state laws control those).

Sarbanes-Oxley (SOX) mandates 7 years for audit work papers and records relevant to financial statement audits (SEC Rule 2-06). Any system generating financial data or supporting financial reporting needs audit trails retained for the full period.

ISO 27001:2022 doesn’t prescribe specific retention timeframes. Organizations define their own periods based on risk assessment, legal requirements, and business needs under Controls 8.15 (Logging) and 8.16 (Monitoring Activities).

CIS Controls v8 recommends a 90-day minimum for audit log retention (Control 8.10). The framework organizes safeguards across three Implementation Groups, with IG2 requiring centralized log management and IG3 adding command-line audit logging.

NIST SP 800-92 provides federal log management guidance without mandating specific periods. NIST SP 800-171 applies to organizations handling Controlled Unclassified Information (CUI) and requires 90 days minimum for system audit logs per DFARS 252.204-7012.

CMMC 2.0 aligns with NIST 800-171’s 90-day minimum for defense contractors seeking DoD contracts. CMMC assessments are triennial, which practically extends documentation retention beyond the minimum audit log period.

GDPR operates on a storage limitation principle: personal data shouldn’t be kept longer than necessary (Article 5(1)(e)). This creates a direct tension with security retention requirements, since logs containing usernames, IP addresses, or email addresses require documented justification for their retention periods.

CCPA/CPRA requires 24 months of retention for consumer request records. It applies to businesses meeting California’s thresholds for revenue, data volume, or data sales, and requires disclosure of retention periods for each category of personal information.

GLBA Safeguards Rule applies to financial institutions and requires customer information disposal no later than 2 years after last use. It also mandates annual risk assessments, annual penetration testing, and vulnerability assessments at least every six months.

SEC Rule 17a-4 and FINRA Rule 4511 impose the strictest record retention in financial services. Broker-dealers must retain general ledgers and customer account records for 6 years, communications for 3 years, with the first 2 years readily accessible. A 2022 SEC amendment now allows audit-trail alternatives to traditional WORM storage.

OSHA Recordkeeping (29 CFR 1910.1020 | 29 CFR 1904) contains the longest mandatory federal retention period: employee exposure and medical records for toxic substances must be kept for the duration of employment plus 30 years. Injury and illness logs require 5 years.

IRS Requirements vary by record type. Employment tax records require 4 years from the date the tax becomes due or is paid (26 CFR 31.6001-1). General business records range from 3 years to indefinite depending on circumstances.

Framework Explorer

Explore 14 compliance frameworks and their log retention requirements. Select a framework to see who it applies to, what must be logged, retention periods, and key regulatory citations.

🔍
Filter by Category
Select Framework
Select a framework above to explore its retention requirements.
14 frameworks · 8 categories · Verified against official regulatory publications
No matching frameworks found.
Try broadening your search or selecting a different category.
Educational Reference. This tool is for informational and educational purposes only. It is not legal or compliance advice. All retention periods and citations are sourced from official regulatory publications. Verify all requirements against current regulatory texts and consult qualified professionals before making compliance decisions.
Data sourced from official regulatory publications. All values verified against authoritative sources. Full Article

Master Compliance Retention Table

This table consolidates all IT log retention requirements for rapid lookup.

Master Compliance Retention Table

Filter by framework, industry, or record type. Sort any column. Export filtered results to CSV, PDF, or Markdown for your compliance documentation.

This table is an educational reference summarizing publicly available regulatory requirements. It is not legal advice. Framework requirements change with each revision cycle. Verify current obligations against official sources and consult qualified legal or compliance professionals before making retention decisions. Click any framework badge to access its authoritative source.

Critical Compliance Principle
When multiple frameworks apply to the same record type, use the most restrictive requirement. Select multiple frameworks below to compare requirements and identify the controlling retention period.
PCI-DSS 4.0
HIPAA
SOX
ISO 27001:2022
CIS Controls v8
NIST SP 800-171
CMMC 2.0
GDPR
CCPA/CPRA
GLBA
SEC 17a-4
FINRA
OSHA
IRS
Loading…
Framework ▲▼ Citation ▲▼ Record Type ▲▼ Min. Retention ▲▼ Hot Access ▲▼ Industry ▲▼
No matching records found.
Try broadening your filters or clearing the search.
Data sourced from official regulatory publications. Verify current requirements against authoritative sources before compliance decisions. Full Article

IT Operations Log Requirements by System Type

IT Operations Log Requirements by System Type

The compliance tables above answer “what does HIPAA require?” but don’t answer the practical question engineers actually ask: “How long should I keep firewall logs?”

This section bridges that gap. The interactive navigator below organizes retention requirements by the systems IT teams actually manage, maps them to applicable compliance frameworks, and shows practical minimum recommendations that satisfy both compliance and operational needs.

Important: The “Practical Minimum” values in the navigator are industry guidance recommendations based on common operational needs (incident investigation, troubleshooting, capacity planning). They are NOT regulatory mandates. Your actual requirements depend on which compliance frameworks apply to your organization. When a specific framework applies, its retention period supersedes the practical minimum.

System Type Navigator

Explore log retention by system type. Select a category to see its log types, practical minimums, and framework compliance gaps. Use the framework checkboxes to scope gap analysis to your applicable frameworks.

Select System Type
Framework Scope
No matching log types found.
Try broadening your search or selecting a different system type.
Select a system type above to explore its log retention details.
13 system types · 79 log types · 4 compliance frameworks

These practical minimums apply to routine operations. Upon discovery of a security incident, organizations should immediately implement an evidence preservation hold that suspends all log deletion for affected systems.

Layer 1: NIST SP 800-61 Rev 3

Evidence preservation is integrated into the CSF 2.0 Respond function throughout the incident lifecycle. Federal General Records Schedule (GRS 24) specifies 3-year retention for incident handling records.

Layer 2: Litigation Hold (FRCP Rule 37(e))

Once litigation is reasonably anticipated, all routine retention and destruction policies must be suspended. Cybersecurity incidents involving customer data or regulatory notifications will almost always trigger this obligation. Failure to preserve can result in sanctions, adverse inference instructions, or case dismissal.

Layer 3: Regulatory Investigation Holds

Breach notification to regulators (HHS for HIPAA, state AGs, SEC for public companies) may require evidence preservation for the duration of investigation, which can extend years beyond the incident itself. Consult legal counsel when an incident is discovered.

Educational Reference. This tool is for informational and educational purposes only. It is not legal or compliance advice. Practical minimums represent industry operational guidance for investigation and troubleshooting, not regulatory mandates. Verify all retention requirements against official regulatory sources and consult qualified professionals before making compliance decisions.
Data sourced from official regulatory publications and industry operational guidance. All values verified against authoritative sources. Full Article

What follows is vendor-specific configuration guidance for each system type. The retention data lives in the navigator above. The guidance below covers what the navigator doesn’t: how to configure logging, where vendor defaults fall short, and what to watch out for in production.


Firewall and Network Security Logs

Firewalls often generate among the highest volumes of logs in enterprise environments. Retention decisions balance storage costs against investigative needs.

Firewall vendor defaults (typical; varies by model, version, and configuration):

VendorDefault Local RetentionRecommended Action
Palo AltoDepends on disk sizeForward to Cortex Data Lake or SIEM
FortinetLimited (often 7 days on smaller models)Configure FortiAnalyzer or syslog to SIEM
Cisco ASA/FTDLimited local storageForward via syslog to centralized storage
Check PointSmartLog dependentConfigure Log Exporter to SIEM
SophosVaries by model (7-90 days typical)Forward to Sophos Central or SIEM
pfSense/OPNsenseLocal disk onlyConfigure remote syslog immediately

Critical Note: Firewall local storage is NOT a retention strategy. Local logs are overwritten quickly and lost if the device fails. Always forward to centralized storage.


Windows Server and Workstation Logs

Windows Event Logs are essential for security monitoring but require deliberate configuration. Default settings miss critical security events.

Windows Configuration Requirements:

CRITICAL: Default Windows logging is INSUFFICIENT for security monitoring.

Enable via Group Policy or local policy:

  • Advanced Audit Policy Configuration (not Basic)
  • Command Line Process Auditing (for Event 4688)
  • PowerShell Script Block Logging
  • PowerShell Module Logging

Deploy Sysmon for:

  • Process creation with hashes
  • Network connections by process
  • File creation timestamps
  • Registry modifications
  • DNS queries

Windows Log Forwarding Options:

MethodBest ForConsideration
Windows Event Forwarding (WEF)Windows-only environmentsFree, built-in, Kerberos encrypted
Winlogbeat (Elastic)ELK Stack environmentsLightweight, flexible filtering
Splunk Universal ForwarderSplunk environmentsFull Splunk integration
NXLogMulti-platform, complex routingOpen-source and enterprise versions
Microsoft Sentinel Agent (AMA)Azure environmentsDirect to Log Analytics

Linux and Unix Logs

Linux logging depends on the distribution and whether systemd journal or traditional syslog is used.

Linux Audit System (auditd) Critical Rules:

Minimum auditd rules for security monitoring:

# Monitor authentication files
-w /etc/passwd -p wa -k identity
-w /etc/shadow -p wa -k identity
-w /etc/group -p wa -k identity
-w /etc/sudoers -p wa -k sudoers

# Monitor SSH configuration
-w /etc/ssh/sshd_config -p wa -k sshd_config

# Monitor privileged commands
-a always,exit -F path=/usr/bin/sudo -F perm=x -k privileged
-a always,exit -F path=/usr/bin/su -F perm=x -k privileged

# Monitor network configuration changes
-w /etc/hosts -p wa -k network_config
-w /etc/network/ -p wa -k network_config

# Monitor cron
-w /etc/crontab -p wa -k cron
-w /etc/cron.d/ -p wa -k cron

Linux Log Forwarding:

MethodBest ForConfiguration
rsyslogTraditional syslog forwardingBuilt-in, configure /etc/rsyslog.conf
Fluent BitKubernetes, containerizedLightweight, cloud-native
FilebeatELK StackElastic ecosystem integration
VectorHigh-volume, complex routingDatadog acquisition, performant
journald remotesystemd environmentsNative journal forwarding

Network Infrastructure Logs

Routers, switches, and wireless controllers provide network visibility essential for incident investigation.

Network Device Syslog Severity Guidance:

SeverityLevelRetention Recommendation
0-2 (Emergency, Alert, Critical)Always retain12+ months
3-4 (Error, Warning)Important180 days
5-6 (Notice, Informational)Operational90 days
7 (Debug)Troubleshooting only7 days or disable

Critical: Never run production network devices at debug level continuously. Enable debug only for active troubleshooting.


DNS, DHCP, and IPAM Logs

These infrastructure services are critical for incident investigation and attribution. DHCP logs answer the single most common forensic question: “Who had this IP address at this time?”

DNS Logging Specifics:

DNS PlatformConfiguration LocationNotes
Windows DNSDNS Manager > Server Properties > Debug LoggingAlso enable via Audit Policy
BINDnamed.conf querylog optionHigh volume; consider sampling
InfobloxGrid > DNS > LoggingCentralized logging built-in
Pi-holeBuilt-in query logLimited retention; forward to SIEM
Cloudflare GatewayDashboard or APICloud-native, varies by plan

Email and Messaging Logs

Email logs support security investigations, HR inquiries, and legal discovery.

Email Gateway Vendor Notes (verify with vendor; varies by contract and configuration):

PlatformDefault RetentionAction Required
Microsoft 365 Message Trace10 days detailed, 90 days summaryUse Purview for longer retention
ProofpointPer contract/configurationConfigure Proofpoint Archive
MimecastPer contractVerify archive settings
BarracudaLocal appliance dependentConfigure cloud archive
Cisco Email SecurityLimited localForward to SIEM

Database Audit Logs

Database logs are critical for data breach investigations and compliance evidence.

What Database Actions to Audit:

Action CategoryPriorityCompliance Requirement
Login success/failureCriticalAll frameworks
Schema changes (DDL)CriticalSOX, PCI-DSS
Privilege changes (GRANT/REVOKE)CriticalPCI-DSS, HIPAA
Data access (SELECT on sensitive tables)HighPCI-DSS (CHD), HIPAA (ePHI)
Data modification (INSERT/UPDATE/DELETE)HighSOX, compliance evidence
Stored procedure executionMediumDepends on content
Backup/restore operationsCriticalDisaster recovery evidence

Critical: Do NOT enable full query logging in production without understanding the performance impact. Audit specific sensitive tables and privileged operations.


Endpoint Security Logs

Antivirus, EDR, and endpoint protection logs are primary sources for threat detection.

EDR Platform Retention Notes (verify current limits with vendor; subject to license tier and configuration):

PlatformConsole RetentionLong-term Option
CrowdStrike Falcon~90 days (Investigate)Falcon Data Replicator to S3
Microsoft Defender for Endpoint~180 days (Timeline), ~30 days (Advanced Hunting)Stream to Sentinel
SentinelOne14-365 days (varies by license tier)Deep Visibility data export
Carbon BlackVaries by deployment typeForward to SIEM
Cortex XDRLicense and configuration dependentCortex Data Lake retention

Virtualization and Container Logs

Virtual infrastructure and container platforms require dedicated logging strategies.

Kubernetes Audit Log Configuration:

Minimum audit policy for security monitoring:

yaml

apiVersion: audit.k8s.io/v1
kind: Policy
rules:
  # Log all requests at Metadata level
  - level: Metadata
    resources:
    - group: ""
      resources: ["secrets", "configmaps"]
  # Log authentication failures
  - level: Metadata
    users: ["system:anonymous"]
  # Log all changes to cluster resources
  - level: RequestResponse
    verbs: ["create", "update", "patch", "delete"]
    resources:
    - group: ""
      resources: ["pods", "services", "deployments"]

Critical for Containers: Container logs are ephemeral by default. Without explicit logging configuration, logs are lost when containers restart. Deploy a log aggregation sidecar (Fluent Bit) or DaemonSet from day one.


Backup and Recovery Logs

Backup logs prove recovery capability and detect ransomware targeting backup systems. Attackers increasingly target backup credentials and configurations to prevent recovery. Retain backup job logs, restore test results, and backup system authentication logs for at least 12 months. See the System Type Navigator above for the full breakdown by log type.


Physical Security Logs

Badge readers and physical access logs support security investigations and may be required by compliance (PCI-DSS for data centers, HIPAA for facilities housing ePHI). Correlate physical access events with logical access logs for insider threat detection. See the System Type Navigator above for retention recommendations by log type.


Certificate and PKI Logs

Certificate infrastructure logs support security and troubleshooting. CA audit logs carry the longest recommended retention in this section (7 years, matching certificate validity periods plus a buffer). Key ceremony logs for HSM access and key generation should be retained permanently as compliance evidence. See the System Type Navigator above for the full breakdown.


Cloud Platform Default Retention Gaps

Most cloud platforms and SaaS services have default log retention periods that do not meet compliance requirements. IT teams must explicitly configure extended retention or export logs to long-term storage.

Verification Note: Cloud platform defaults change as vendors update their services. The values below reflect documented defaults as of January 2025. Always verify current retention settings against official vendor documentation before making compliance decisions. Links to authoritative documentation are provided in the Resources section.

Cloud Gap Analyzer

Default retention periods for cloud services rarely meet compliance requirements out of the box. Select a platform to see where the gaps are and what to do about them.
Select Cloud Platform
Compliance Lens
Choose a cloud platform above to analyze retention gaps
Best Practice
Service Default Retention Gap Severity HIPAA Gap PCI-DSS Gap SOX Gap CIS Gap Compliance Gap Required Action

Amazon Web Services (AWS)

AWS Best Practice: Use S3 with Intelligent-Tiering or Glacier transitions for cost-effective long-term retention. Enable S3 Object Lock for WORM compliance where required (SEC 17a-4, FINRA).


Microsoft Azure

Azure Best Practice: Use Log Analytics workspace with tiered retention (interactive to archive to Storage Account with cool/archive tiers). Configure Diagnostic Settings for every security-relevant service.


Microsoft 365

M365 Best Practice: E5 licensing with Purview Audit (Premium) retention policies is required for multi-year compliance. Configure Microsoft Graph API export for independent archival of critical logs.


Google Cloud Platform (GCP)

GCP Best Practice: Create organization-level log sinks to Cloud Storage with Object Lifecycle Management. Use BigQuery for queryable long-term retention of security-critical logs.


Storage Tier Implementation

Effective log retention balances access speed, storage cost, and compliance requirements.

TierTypical RetentionStorage TypeUse CaseRelative Cost
Hot1-7 daysSSD/NVMe, Fully IndexedReal-time alerting, active investigations$$$$$ (Highest)
Warm30-90 daysHDD/Hybrid, Partially IndexedHistorical analysis, threat hunting$$$ (Moderate)
ColdMonths to 1 yearObject Storage (S3 Standard-IA, Azure Cool)Compliance retention, infrequent forensics$$ (Low)
Frozen/ArchiveYears (1-7+)Glacier, Archive Tier, TapeLong-term compliance, legal hold$ (Lowest)

Cost optimization strategies:

  • Compression: Most log data compresses 80-90%
  • Selective retention: Full fidelity for security logs; sampled/aggregated for operational logs
  • Log level adjustment: Reduce DEBUG/TRACE in production unless actively troubleshooting
  • Deduplication: Eliminate redundant log collection paths

Secure Destruction Requirements

When retention periods expire, logs must be securely destroyed following NIST SP 800-88 Guidelines for Media Sanitization:

Clear: Logical techniques (overwriting) protecting against simple recovery. Acceptable for non-sensitive data on media being reused within the organization.

Purge: Physical or logical techniques (degaussing, cryptographic erase) rendering recovery infeasible with state-of-the-art laboratory techniques. Required for sensitive data on media leaving organizational control.

Destroy: Physical destruction (shredding, incineration, disintegration) rendering recovery infeasible and the media unusable.

Documentation requirement: Maintain destruction certificates including date, method, personnel performing destruction, and verification method. Retain destruction certificates for minimum 7 years.


Implementation Checklist

For each cloud service and SaaS platform in your environment:

Implementation Checklist

0 of 10 complete
All 10 steps complete. Export your implementation plan above.
Guidance sourced from article content and authoritative regulatory publications. Full Article

Authoritative Sources and Resources

Primary Regulatory Sources

Payment Card Industry

Healthcare (HIPAA)

Financial (SOX, SEC, FINRA, GLBA)

Federal Guidance (NIST)

International Standards

Industry Best Practices

Privacy Regulations

Employment and Safety

Cloud Platform Documentation

Amazon Web Services

Microsoft Azure

Microsoft 365

Google Cloud Platform


Glossary

TermDefinition
Audit TrailChronological record providing documentary evidence of the sequence of activities affecting a specific operation, procedure, or event
Business AssociateUnder HIPAA, a person or entity performing functions involving use or disclosure of PHI on behalf of a covered entity
Chain of CustodyDocumentation showing seizure, custody, control, transfer, analysis, and disposition of evidence
Covered EntityUnder HIPAA: health plans, healthcare clearinghouses, and healthcare providers transmitting health information electronically
CUIControlled Unclassified Information requiring safeguarding per law, regulation, or government-wide policy
ePHIElectronic Protected Health Information created, stored, transmitted, or received electronically
Hot StorageHigh-performance, immediately accessible storage (SSD/NVMe) for real-time analysis
Litigation HoldLegal requirement to preserve all relevant documents when litigation is reasonably anticipated
SIEMSecurity Information and Event Management technology aggregating, correlating, and analyzing security events
WORMWrite Once Read Many storage preventing modification or deletion after initial write

Ready to Test Your Knowledge?


This document provides general guidance based on publicly available regulatory requirements as of January Feb 2026. Organizations should consult qualified legal counsel and compliance professionals to determine specific obligations. Retention requirements are subject to change through regulatory amendment. Always verify against primary authoritative sources.

Author

Derrick Jackson

I’m the Founder of Tech Jacks Solutions and a Senior Director of Cloud Security Architecture & Risk (CISSP, CRISC, CCSP), with 20+ years helping organizations (from SMBs to Fortune 500) secure their IT, navigate compliance frameworks, and build responsible AI programs.

Leave a comment

Your email address will not be published. Required fields are marked *