Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Information Security
IT Log and Record Retention

Author: Derrick D. Jackson
Title: Founder & Senior Director of Cloud Security Architecture & Risk
Credentials: CISSP, CRISC, CCSP
Last updated 01/17/2026

Table of Contents

IT log and Record Retention

A comprehensive cross-framework reference for IT professionals, compliance officers, and AI systems seeking to verify retention obligations across PCI-DSS, HIPAA, SOX, ISO 27001, NIST, and 15+ regulatory frameworks.


Your CloudTrail Logs Disappeared. Now What?

Here’s a scenario that illustrates a common problem: A healthcare organization discovers during a breach investigation that their AWS CloudTrail Event History only retained 90 days of data. The attack started 4 months earlier. Their HIPAA compliance required 6 years of audit documentation. The forensic trail is gone.

This type of situation occurs regularly. Organizations assume logging is “on” without realizing that default retention periods rarely meet compliance requirements. PCI-DSS demands 12 months. HIPAA requires 6 years. SOX mandates 7 years. Most cloud platforms default to 30-90 days.

This guide consolidates every major IT log retention requirement into a single reference. No more hunting through regulatory documents. No more assumptions about what “compliant” means for your specific situation.


What This Guide Covers

This reference addresses IT-produced logs and system-generated audit trails. It covers the technical records that IT teams manage: security event logs, access logs, system audit trails, network flow logs, and application logs.

Frameworks included:

  • PCI-DSS 4.0
  • HIPAA Security Rule
  • Sarbanes-Oxley (SOX)
  • ISO 27001:2022
  • CIS Controls v8
  • NIST SP 800-92 and 800-171
  • CMMC 2.0
  • GDPR and CCPA/CPRA
  • GLBA Safeguards Rule
  • SEC Rule 17a-4 and FINRA
  • OSHA Recordkeeping
  • IRS Employment Tax Requirements

What this guide does NOT cover: General business records, medical records (state law dependent), contracts, insurance policies, or HR personnel files beyond their intersection with IT systems.


The Critical Compliance Principle

When multiple frameworks apply to the same record type, use the most restrictive requirement.

Example: Your organization processes credit cards (PCI-DSS: 12 months) and handles healthcare data (HIPAA: 6 years). Audit logs touching both domains require 6-year retention.

Example: A defense contractor (NIST 800-171: 90 days minimum) that is also publicly traded (SOX: 7 years) retains financial system audit trails for 7 years.

This principle eliminates guesswork. Map your data types to applicable frameworks, identify the longest required period, and implement that standard.


Framework-by-Framework Requirements

PCI-DSS 4.0

Applies to: Any organization that stores, processes, or transmits cardholder data.

Retention requirement: 12 months for audit logs, with 90 days (3 months) immediately accessible for analysis.

What must be logged (Requirement 10.2):

  • All individual access to cardholder data
  • All actions taken by anyone with administrative privileges
  • Access to all audit trails
  • Invalid logical access attempts
  • Use of and changes to identification and authentication mechanisms
  • Initialization, stopping, or pausing of audit logs
  • Creation and deletion of system-level objects

Key citation: PCI-DSS 4.0 Requirement 10.5.1 states audit log history must be retained for at least 12 months, with at least the most recent three months immediately available for analysis.

Automated review required: Requirement 10.4.1.1 mandates automated mechanisms for performing audit log reviews. Manual daily review of thousands of log entries is not feasible at scale.

Source: PCI Security Standards Council Document Library


HIPAA Security Rule

Applies to: Covered entities (healthcare providers, health plans, healthcare clearinghouses) and their business associates.

Retention requirement: 6 years from date of creation OR last effective date, whichever is later.

Key citations:

  • 45 CFR 164.316(b)(2)(i): Documentation of policies and procedures must be retained for 6 years from the date of creation or the date when it last was in effect, whichever is later.
  • 45 CFR 164.530(j): Documentation required by the Privacy Rule must be retained for 6 years.
  • 45 CFR 164.312(b): Requires implementation of hardware, software, and procedural mechanisms to record and examine activity in systems containing ePHI.

Important clarification: HIPAA does NOT mandate specific retention periods for medical records themselves. State laws control medical record retention (typically 6-10 years for adults, longer for minors until age of majority plus additional years). HIPAA’s 6-year requirement applies to policies, procedures, and documentation demonstrating compliance.

Source: HHS HIPAA Security Rule


Sarbanes-Oxley Act (SOX)

Applies to: Publicly traded companies and their auditors.

Retention requirement: 7 years for audit work papers and records relevant to the audit or review.

Key citation: SEC Rule 2-06 requires retention of records relevant to the audit or review of financial statements for 7 years after the auditor concludes the audit or review.

IT implication: Any system generating financial data or supporting financial reporting requires audit trails retained for 7 years. This includes ERP systems, general ledger applications, revenue recognition systems, and access management systems for financial applications.

Source: SEC Sarbanes-Oxley Act


ISO 27001:2022

Applies to: Organizations implementing an Information Security Management System (ISMS), whether for certification or as a governance framework.

Retention requirement: Organization-defined based on risk assessment, legal requirements, and business needs.

Key controls:

  • Control 8.15 (Logging): Event logs recording user activities, exceptions, faults, and information security events shall be produced, stored, protected, and analyzed.
  • Control 8.16 (Monitoring Activities): Networks, systems, and applications shall be monitored for anomalous behavior and appropriate actions taken.
  • Control 8.17 (Clock Synchronization): Clocks of all relevant information processing systems shall be synchronized to approved time sources.

Practical guidance: ISO 27001 requires documented retention periods but does not prescribe specific timeframes. Organizations must define retention periods based on: legal and regulatory requirements applicable to their industry, contractual obligations, business continuity needs, and risk assessment outcomes.

Source: ISO 27001:2022


CIS Controls v8

Applies to: Organizations implementing cyber defense best practices.

Retention requirement: 90 days minimum recommended (Control 8.10).

Control 8 safeguards by Implementation Group:

IG1 (Basic):

  • 8.1: Establish and maintain an audit log management process
  • 8.2: Collect audit logs
  • 8.3: Ensure adequate audit log storage

IG2 (Standard):

  • 8.4: Standardize time synchronization
  • 8.5: Collect detailed audit logs
  • 8.6: Collect DNS query audit logs
  • 8.7: Collect URL request audit logs
  • 8.9: Centralize audit logs
  • 8.10: Retain audit logs for minimum 90 days
  • 8.11: Conduct audit log reviews

IG3 (Advanced):

  • 8.8: Collect command-line audit logs
  • 8.12: Collect service provider logs

Source: CIS Controls v8


NIST SP 800-92 and NIST SP 800-171

NIST SP 800-92 provides general guidance for federal agencies and serves as a reference framework. It defines log management infrastructure components (generation, transmission, storage, analysis, disposal) but does not mandate specific retention periods.

NIST SP 800-171 applies to organizations handling Controlled Unclassified Information (CUI), typically defense contractors.

Retention requirement: 90 days minimum for CUI system audit logs per DFARS 252.204-7012.

Key requirements (800-171):

  • 3.3.1: Create and retain system audit logs and records to enable monitoring, analysis, investigation, and reporting
  • 3.3.2: Ensure actions of individual system users can be uniquely traced

Source: NIST SP 800-92 | NIST SP 800-171


CMMC 2.0

Applies to: Defense contractors seeking Department of Defense contracts.

Retention requirement: Aligned with NIST 800-171 (90 days minimum for audit logs).

Key consideration: CMMC assessments are triennial. Organizations must maintain evidence of continuous compliance, which practically extends documentation retention beyond the minimum audit log period.

Source: DoD CMMC


GDPR

Applies to: Organizations processing personal data of EU residents.

Retention principle: Storage limitation. Personal data should be kept no longer than necessary for the purposes for which it was collected.

Key citation: Article 5(1)(e) establishes that personal data shall be kept in a form which permits identification of data subjects for no longer than is necessary.

Practical tension: GDPR’s storage limitation conflicts with security retention requirements. Logs containing personal data (usernames, IP addresses, email addresses) require documented justification for retention periods. Organizations must balance security visibility against privacy minimization.

Article 30 requirement: Organizations must maintain records of processing activities, including retention periods or criteria used to determine them.

Source: GDPR Official Text


CCPA/CPRA

Applies to: Businesses meeting California thresholds for revenue, data volume, or data sales.

Specific requirement: Records of consumer requests and how the business responded must be maintained for 24 months.

General principle: Data minimization. Organizations must disclose to consumers the retention periods for each category of personal information, or the criteria used to determine retention.

Source: California Attorney General CCPA


GLBA Safeguards Rule

Applies to: Financial institutions (banks, credit unions, securities firms, insurance companies, and other entities significantly engaged in financial activities).

Retention requirement: Customer information disposal no later than 2 years after last use.

Operational requirements affecting IT:

  • Annual risk assessments
  • Annual penetration testing
  • Vulnerability assessments at least every six months
  • Continuous monitoring or annual assessments
  • Written information security program (WISP)

Source: FTC Safeguards Rule


SEC Rule 17a-4 and FINRA

Applies to: Broker-dealers.

Retention requirements:

  • General ledgers: 6 years
  • Trade blotters and records: 6 years (first 2 years readily accessible)
  • Customer account records: 6 years after account closure
  • Communications (including electronic): 3 years (first 2 years readily accessible)
  • Order tickets: 3 years

2022 amendment: SEC modernized Rule 17a-4 to allow an audit-trail alternative to traditional WORM (Write Once Read Many) storage, provided the system meets specified requirements for preventing alteration or deletion.

Source: SEC Rule 17a-4 | FINRA Rule 4511


OSHA Recordkeeping

29 CFR 1910.1020 (Access to Employee Exposure and Medical Records):

  • Employee exposure records: Duration of employment plus 30 years
  • Employee medical records for toxic substance exposure: Duration of employment plus 30 years

This is the longest mandatory federal retention period. Organizations with occupational health monitoring programs must plan for multi-decade retention.

29 CFR 1904 (Recording and Reporting Occupational Injuries and Illnesses):

  • OSHA 300 logs and related documents: 5 years following the end of the calendar year covered

Source: OSHA Recordkeeping | 29 CFR 1910.1020


IRS Requirements

General business records: 3 years from filing date (6 years if income underreported by more than 25%, 7 years for bad debt or worthless securities, indefinitely for unfiled or fraudulent returns).

Employment tax records (26 CFR 31.6001-1): 4 years from the date the tax becomes due or is paid, whichever is later.

Source: IRS Record Retention


Master Compliance Retention Table

This table consolidates all IT log retention requirements for rapid lookup.


IT Operations Log Requirements by System Type

The compliance tables above answer “what does HIPAA require?” but don’t answer the practical question engineers actually ask: “How long should I keep firewall logs?”

This section bridges that gap. It organizes requirements by the systems IT teams actually manage, maps them to applicable compliance frameworks, and provides practical minimum recommendations that satisfy both compliance AND operational needs (incident investigation, troubleshooting, capacity planning).

How to Use This Section

  1. Find your system type in the tables below
  2. Identify which compliance frameworks apply to your organization
  3. Use the “Practical Minimum” as your baseline (covers most operational needs)
  4. Extend to meet your most restrictive compliance requirement
  5. Document your retention policy in your system security plan

Important: The “Practical Minimum” values in these tables are industry guidance recommendations based on common operational needs (incident investigation, troubleshooting, capacity planning). They are NOT regulatory mandates. Your actual requirements depend on which compliance frameworks apply to your organization. When a specific framework applies, its retention period supersedes the practical minimum.


Firewall and Network Security Logs

Firewalls often generate among the highest volumes of logs in enterprise environments. Retention decisions balance storage costs against investigative needs.

Log TypeWhat It ContainsPractical MinimumCompliance DriverExtended Retention
Traffic Logs (Allow/Deny)Source/dest IP, port, protocol, action, bytes, timestamp90 daysPCI-DSS (12 mo), CIS (90 days)12 months if processing cards
Threat Logs (IPS/IDS)Attack signatures, CVE references, threat severity180 daysIncident investigation12+ months for threat intel
URL Filtering LogsUser, URL category, action, timestamp90 daysCIS Control 8.712 months if HR/legal review needed
DNS Security LogsQuery, response, threat verdict90 daysCIS Control 8.612 months for threat hunting
SSL/TLS Inspection LogsDecrypted session metadata (not content)90 daysCompliance verificationPer data classification policy
Admin/Config ChangesWho changed what, when, from where12 monthsPCI-DSS 10.2.2, SOX7 years if SOX applies
VPN LogsUser, source IP, connect/disconnect times, bytes180 daysAccess auditing12 months for remote access review
NAT Translation LogsInternal-to-external IP mapping90 daysIncident attribution12 months if legally required

Firewall Vendor Specifics (typical defaults; varies by model, version, and configuration):

VendorDefault Local RetentionRecommended Action
Palo AltoDepends on disk sizeForward to Cortex Data Lake or SIEM
FortinetLimited (often 7 days on smaller models)Configure FortiAnalyzer or syslog to SIEM
Cisco ASA/FTDLimited local storageForward via syslog to centralized storage
Check PointSmartLog dependentConfigure Log Exporter to SIEM
SophosVaries by model (7-90 days typical)Forward to Sophos Central or SIEM
pfSense/OPNsenseLocal disk onlyConfigure remote syslog immediately

Critical Note: Firewall local storage is NOT a retention strategy. Local logs are overwritten quickly and lost if the device fails. Always forward to centralized storage.


Windows Server and Workstation Logs

Windows Event Logs are essential for security monitoring but require deliberate configuration. Default settings miss critical security events.

Log ChannelKey Event IDsPractical MinimumCompliance DriverNotes
Security4624/4625 (Logon success/fail)180 daysPCI-DSS, HIPAA, all frameworksEnable success AND failure auditing
Security4648 (Explicit credential logon)180 daysLateral movement detectionOften disabled by default
Security4672 (Special privileges assigned)180 daysPrivilege escalation detectionAdmin activity tracking
Security4688 (Process creation)90 daysMalware execution detectionMUST enable command-line logging
Security4720/4726 (Account created/deleted)12 monthsPCI-DSS 10.2.5Unauthorized account detection
Security4732/4733 (Member added/removed from group)12 monthsPrivilege changesCritical for admin groups
Security4768/4769/4771 (Kerberos)90 daysAuthentication attacksKerberoasting, Golden Ticket
Security4776 (NTLM authentication)90 daysCredential attacksPass-the-hash detection
System7045 (Service installed)180 daysPersistence mechanismsMalware often installs services
System1074/6006/6008 (Shutdown/startup)90 daysAvailability trackingUnexpected reboots
ApplicationApplication-specific90 daysTroubleshootingVaries by application
PowerShell4103/4104 (Script block logging)90 daysMalicious script detectionMUST enable script block logging
SysmonAll (1-26)180 daysAdvanced threat detectionDeploy Sysmon for visibility

Windows Configuration Requirements:

CRITICAL: Default Windows logging is INSUFFICIENT for security monitoring.

Enable via Group Policy or local policy:

– Advanced Audit Policy Configuration (not Basic)

– Command Line Process Auditing (for Event 4688)

– PowerShell Script Block Logging

– PowerShell Module Logging

Deploy Sysmon for:

– Process creation with hashes

– Network connections by process

– File creation timestamps

– Registry modifications

– DNS queries

Windows Log Forwarding Options:

MethodBest ForConsideration
Windows Event Forwarding (WEF)Windows-only environmentsFree, built-in, Kerberos encrypted
Winlogbeat (Elastic)ELK Stack environmentsLightweight, flexible filtering
Splunk Universal ForwarderSplunk environmentsFull Splunk integration
NXLogMulti-platform, complex routingOpen-source and enterprise versions
Microsoft Sentinel Agent (AMA)Azure environmentsDirect to Log Analytics

Linux and Unix Logs

Linux logging depends on the distribution and whether systemd journal or traditional syslog is used.

Log File/SourceWhat It ContainsPractical MinimumCompliance DriverNotes
/var/log/auth.log (Debian/Ubuntu)Authentication events, sudo usage180 daysPCI-DSS, HIPAASSH logins, sudo commands
/var/log/secure (RHEL/CentOS)Same as auth.log180 daysPCI-DSS, HIPAAAuthentication and authorization
/var/log/audit/audit.logKernel-level audit events180 daysCIS, NIST 800-171Requires auditd configuration
/var/log/syslog or journaldSystem messages, service status90 daysTroubleshootingService starts/stops/failures
/var/log/kern.logKernel messages90 daysHardware/driver issuesSecurity module messages
/var/log/cronScheduled task execution90 daysUnauthorized job detectionPersistence mechanism
/var/log/faillogFailed login attempts180 daysBrute force detectionUse faillock on modern systems
/var/log/lastlogLast login per user180 daysAccess reviewBinary file, use lastlog command
Application logs (/var/log/nginx, apache, etc.)Web server access/errors90-180 daysPCI-DSS if processing cardsAccess logs critical for forensics

Linux Audit System (auditd) Critical Rules:

# Minimum auditd rules for security monitoring:

# Monitor authentication files

-w /etc/passwd -p wa -k identity

-w /etc/shadow -p wa -k identity

-w /etc/group -p wa -k identity

-w /etc/sudoers -p wa -k sudoers

# Monitor SSH configuration

-w /etc/ssh/sshd_config -p wa -k sshd_config

# Monitor privileged commands

-a always,exit -F path=/usr/bin/sudo -F perm=x -k privileged

-a always,exit -F path=/usr/bin/su -F perm=x -k privileged

# Monitor network configuration changes

-w /etc/hosts -p wa -k network_config

-w /etc/network/ -p wa -k network_config

# Monitor cron

-w /etc/crontab -p wa -k cron

-w /etc/cron.d/ -p wa -k cron

Linux Log Forwarding:

MethodBest ForConfiguration
rsyslogTraditional syslog forwardingBuilt-in, configure /etc/rsyslog.conf
Fluent BitKubernetes, containerizedLightweight, cloud-native
FilebeatELK StackElastic ecosystem integration
VectorHigh-volume, complex routingDatadog acquisition, performant
journald remotesystemd environmentsNative journal forwarding

Network Infrastructure Logs

Routers, switches, and wireless controllers provide network visibility essential for incident investigation.

Device TypeLog TypesPractical MinimumCompliance DriverNotes
Core/Distribution SwitchesPort up/down, MAC table, spanning tree90 daysNetwork troubleshootingCritical for lateral movement
Access SwitchesPort security violations, 802.1X auth180 daysNAC complianceRogue device detection
RoutersRouting changes, ACL hits, BGP events90 daysNetwork integrityConfiguration change tracking
Wireless ControllersClient associations, rogue AP, auth180 daysWireless securityLocation tracking capability
Load BalancersConnection logs, health checks, SSL90 daysApplication deliveryPerformance and security
Network TAPs/Packet BrokersMetadata only (not full capture)30 daysTraffic analysisHigh volume, short retention

Network Device Syslog Severity Guidance:

SeverityLevelRetention Recommendation
0-2 (Emergency, Alert, Critical)Always retain12+ months
3-4 (Error, Warning)Important180 days
5-6 (Notice, Informational)Operational90 days
7 (Debug)Troubleshooting only7 days or disable

Critical: Never run production network devices at debug level continuously. Enable debug only for active troubleshooting.


DNS, DHCP, and IPAM Logs

These infrastructure services are critical for incident investigation and attribution.

ServiceWhat to LogPractical MinimumCompliance DriverInvestigation Value
DNS QueriesClient IP, query, response, timestamp90 daysCIS Control 8.6Malware C2 detection
DNS Zone ChangesRecord modifications, who, when12 monthsChange managementDNS hijacking detection
DHCP LeasesMAC, IP, hostname, lease time180 daysIP attribution“Who had this IP at this time?”
DHCP Scope ChangesConfiguration modifications12 monthsChange managementUnauthorized changes
IPAM TransactionsIP assignments, reservations12 monthsAsset managementHistorical IP ownership

DNS Logging Specifics:

DNS PlatformConfiguration LocationNotes
Windows DNSDNS Manager → Server Properties → Debug LoggingAlso enable via Audit Policy
BINDnamed.conf querylog optionHigh volume; consider sampling
InfobloxGrid → DNS → LoggingCentralized logging built-in
Pi-holeBuilt-in query logLimited retention; forward to SIEM
Cloudflare GatewayDashboard or APICloud-native, varies by plan

Email and Messaging Logs

Email logs support security investigations, HR inquiries, and legal discovery.

Log TypeWhat It ContainsPractical MinimumCompliance DriverNotes
SMTP Transaction LogsSender, recipient, subject, size, status180 daysEmail delivery troubleshootingNOT message content
Message TrackingFull routing path per message90 daysDelivery investigationExchange/M365 built-in
Spam/Phishing VerdictsFiltered messages, threat type180 daysSecurity analysisPhishing campaign tracking
DLP AlertsPolicy violations, data matches12 monthsCompliance evidenceMay contain sensitive data
Admin Audit LogsMailbox access, permission changes12 monthsPCI-DSS, HIPAAPrivileged action tracking
Mailbox Audit LogsOwner/delegate/admin actions180 daysInsider threat detectionM365: verify enabled per mailbox

Email Gateway Vendor Notes (verify with vendor; varies by contract and configuration):

PlatformDefault RetentionAction Required
Microsoft 365 Message Trace10 days detailed, 90 days summaryUse Purview for longer retention
ProofpointPer contract/configurationConfigure Proofpoint Archive
MimecastPer contractVerify archive settings
BarracudaLocal appliance dependentConfigure cloud archive
Cisco Email SecurityLimited localForward to SIEM

Database Audit Logs

Database logs are critical for data breach investigations and compliance evidence.

DatabaseAudit CapabilityPractical MinimumCompliance DriverPerformance Impact
SQL ServerSQL Server Audit, Extended Events180 daysPCI-DSS, HIPAA, SOXModerate (tune carefully)
OracleUnified Auditing, Fine-Grained Audit180 daysPCI-DSS, HIPAA, SOXVaries by policy
MySQL/MariaDBGeneral Query Log, Audit Plugin90 daysDepends on dataHigh (general query log)
PostgreSQLpgAudit extension180 daysDepends on dataLow-moderate
MongoDBNative Auditing (Enterprise)90 daysDepends on dataModerate
Cloud DatabasesRDS/Azure SQL/Cloud SQL auditPer cloud guidanceAll frameworksManaged by provider

What Database Actions to Audit:

Action CategoryPriorityCompliance Requirement
Login success/failureCriticalAll frameworks
Schema changes (DDL)CriticalSOX, PCI-DSS
Privilege changes (GRANT/REVOKE)CriticalPCI-DSS, HIPAA
Data access (SELECT on sensitive tables)HighPCI-DSS (CHD), HIPAA (ePHI)
Data modification (INSERT/UPDATE/DELETE)HighSOX, compliance evidence
Stored procedure executionMediumDepends on content
Backup/restore operationsCriticalDisaster recovery evidence

Critical: Do NOT enable full query logging in production without understanding the performance impact. Audit specific sensitive tables and privileged operations.


Endpoint Security Logs

Antivirus, EDR, and endpoint protection logs are primary sources for threat detection.

SourceWhat It ContainsPractical MinimumCompliance DriverNotes
Antivirus/EPP DetectionsMalware name, path, action taken180 daysMalware incident trackingInclude quarantine events
EDR TelemetryProcess trees, file writes, network90 daysThreat huntingHighest value for investigation
EDR Alerts/DetectionsCorrelated threat detections12 monthsIncident historyLower volume, longer retention
Device ControlUSB/removable media events180 daysData exfiltration detectionPCI-DSS environments
Application ControlBlocked/allowed executables90 daysWhitelist enforcementHigh volume if in audit mode
Host FirewallLocal connection allow/deny90 daysLateral movementOften overlooked

EDR Platform Retention Notes

(verify current limits with vendor; subject to license tier and configuration):

PlatformConsole RetentionLong-term Option
CrowdStrike Falcon~90 days (Investigate)Falcon Data Replicator to S3
Microsoft Defender for Endpoint~180 days (Timeline), ~30 days (Advanced Hunting)Stream to Sentinel
SentinelOne14-365 days (varies by license tier)Deep Visibility data export
Carbon BlackVaries by deployment typeForward to SIEM
Cortex XDRLicense and configuration dependentCortex Data Lake retention

Virtualization and Container Logs

Virtual infrastructure and container platforms require dedicated logging strategies.

PlatformLog TypesPractical MinimumNotes
VMware vCenterLogin, permission changes, VM operations180 daysAdmin activity critical
VMware ESXihostd, vpxa, vmkernel90 daysHost-level events
Hyper-VHyper-V-VMMS, Hyper-V-Worker events90 daysWindows Event Logs
Kubernetes API ServerAPI audit logs90 daysCluster-level operations
Kubernetes Nodeskubelet, container runtime30 daysNode troubleshooting
Container stdout/stderrApplication output90 daysApplication debugging
Docker Daemondockerd logs30 daysContainer runtime events

Kubernetes Audit Log Configuration:

# Minimum audit policy for security monitoring

apiVersion: audit.k8s.io/v1

kind: Policy

rules:

  # Log all requests at Metadata level

  – level: Metadata

    resources:

    – group: “”

      resources: [“secrets”, “configmaps”]

  # Log authentication failures

  – level: Metadata

    users: [“system:anonymous”]

  # Log all changes to cluster resources

  – level: RequestResponse

    verbs: [“create”, “update”, “patch”, “delete”]

    resources:

    – group: “”

      resources: [“pods”, “services”, “deployments”]

Critical for Containers: Container logs are ephemeral by default. Without explicit logging configuration, logs are lost when containers restart. Deploy a log aggregation sidecar (Fluent Bit) or DaemonSet from day one.


Backup and Recovery Logs

Backup logs prove recovery capability and detect ransomware targeting backup systems.

Log TypeWhat It ContainsPractical MinimumCompliance DriverNotes
Backup Job LogsStart/end time, success/failure, size12 monthsDisaster recovery evidenceProve backups occurred
Restore Test LogsRestore attempts, verification results12 monthsCompliance evidenceProve recoverability
Backup System AuthAdmin logins, configuration changes12 monthsRansomware protectionAttackers target backup credentials
Media ManagementTape rotations, offsite transfers12 monthsChain of custodyPhysical media tracking
Replication LogsDR replication status, lag90 daysRPO monitoringReal-time protection verification

Physical Security Logs

Badge readers and physical access logs support security investigations and may be required by compliance.

SystemLog ContentPractical MinimumCompliance DriverNotes
Badge Reader AccessCard ID, door, timestamp, grant/deny12 monthsPCI-DSS (data centers), HIPAACorrelate with logical access
Visitor ManagementVisitor identity, sponsor, areas12 monthsFacility securityIntegration with badge system
Video SurveillanceRecorded footage30-90 daysIncident investigationStorage-intensive
Alarm SystemsArm/disarm, alerts, bypasses12 monthsAfter-hours accessIntegration with access control

Certificate and PKI Logs

Certificate infrastructure logs support security and troubleshooting.

Log TypeWhat It ContainsPractical MinimumCompliance DriverNotes
CA Audit LogsCertificate issuance, revocation7 yearsCertificate lifecycleMatch cert validity + buffer
Certificate RequestsCSR submissions, approvals/denials12 monthsRequest trackingWho requested what
CRL/OCSP LogsRevocation check requests90 daysTroubleshootingHigh volume
Key Ceremony LogsHSM access, key generationPermanentCompliance evidenceCritical security events

IT Operations Log Retention Summary Table

This table provides a single reference for IT engineers to determine retention by system type.

System CategoryLog TypeMinimum OpsPCI-DSSHIPAASOXCIS Baseline
FirewallTraffic (allow/deny)90 days12 mo6 yr7 yr90 days
FirewallThreat/IPS180 days12 mo6 yr7 yr90 days
FirewallAdmin changes12 months12 mo6 yr7 yr90 days
WindowsSecurity Event Log180 days12 mo6 yr7 yr90 days
WindowsPowerShell/Sysmon90 days12 mo6 yr7 yr90 days
Linuxauth.log/secure180 days12 mo6 yr7 yr90 days
Linuxauditd180 days12 mo6 yr7 yr90 days
Network DevicesSyslog (sev 0-4)90 days12 mo6 yr7 yr90 days
DNSQuery logs90 days12 mo6 yr7 yr90 days
DHCPLease logs180 days12 mo6 yr7 yr90 days
EmailSMTP/tracking180 days12 mo6 yr7 yr90 days
DatabaseAudit logs180 days12 mo6 yr7 yr90 days
EDR/AVDetections180 days12 mo6 yr7 yr90 days
EDRTelemetry90 days12 mo6 yr7 yr90 days
VirtualizationAdmin/operations180 days12 mo6 yr7 yr90 days
ContainersAPI audit90 days12 mo6 yr7 yr90 days
BackupJob logs12 months12 mo6 yr7 yr90 days
Physical AccessBadge events12 months12 mo6 yr7 yrN/A
PKI/CertificatesCA audit7 years12 mo6 yr7 yr90 days

How to read this table:

  • “Minimum Ops” = recommended baseline for operational/investigation needs regardless of compliance (guidance, not mandate)
  • Framework columns show regulatory requirements where applicable
  • Find your applicable frameworks and use the longest period
  • Example: Healthcare org with firewalls → HIPAA applies → 6 years for firewall logs
  • Always verify current framework requirements against authoritative sources listed in Resources

Cloud Platform Default Retention Gaps

Most cloud platforms and SaaS services have default log retention periods that do not meet compliance requirements. IT teams must explicitly configure extended retention or export logs to long-term storage.

Verification Note: Cloud platform defaults change as vendors update their services. The values below reflect documented defaults as of January 2025. Always verify current retention settings against official vendor documentation before making compliance decisions. Links to authoritative documentation are provided in the Resources section.

Amazon Web Services (AWS)

ServiceDefault RetentionCompliance GapRequired Action
CloudTrail Event History90 daysDoes not meet PCI-DSS 12-month requirementCreate trail with S3 destination; configure S3 lifecycle policies
CloudWatch LogsNever expires (costly)Cost-prohibitive for long-termSet retention policy per log group; export to S3 for cold storage
VPC Flow LogsDestination-dependentNo native long-term optionSend to S3 with lifecycle policy or CloudWatch with export
GuardDuty Findings90 daysInsufficient for incident forensicsExport to S3 via EventBridge or enable Detective
RDS/Aurora Logs7 days (error logs)Far below any compliance standardPublish to CloudWatch Logs; configure retention
Security Hub Findings90 daysInsufficient for complianceExport to S3 via EventBridge automation
WAF LogsNo native retentionMust configure destinationSend to S3, CloudWatch, or Kinesis Firehose
ELB Access LogsNo automatic deletionUnmanaged growth in S3Configure S3 lifecycle policy

AWS Best Practice: Use S3 with Intelligent-Tiering or Glacier transitions for cost-effective long-term retention. Enable S3 Object Lock for WORM compliance where required (SEC 17a-4, FINRA).


Microsoft Azure

ServiceDefault RetentionCompliance GapRequired Action
Activity Log90 daysDoes not meet PCI-DSSExport to Log Analytics workspace or Storage Account
Entra ID Sign-in Logs7 days (Free), 30 days (P1/P2)Severely insufficientConfigure Diagnostic Settings to Log Analytics or Storage
Entra ID Audit Logs7 days (Free), 30 days (P1/P2)Severely insufficientConfigure Diagnostic Settings to Log Analytics or Storage
NSG Flow LogsStorage account dependentNo default policyConfigure Storage Account lifecycle management
Microsoft Sentinel90 days interactive (free tier)Cost increases with retentionConfigure archive tiers; use Basic Logs for cost optimization
Defender for Cloud Alerts90 daysLimited forensic windowExport via continuous export to Log Analytics or Event Hub
Azure Firewall LogsLog Analytics dependentPay-per-retentionSet workspace retention; archive to Storage Account
Key Vault LogsNot enabled by defaultNo visibility without actionEnable Diagnostic Settings

Azure Best Practice: Use Log Analytics workspace with tiered retention (interactive to archive to Storage Account with cool/archive tiers). Configure Diagnostic Settings for every security-relevant service.


Microsoft 365

ServiceDefault RetentionCompliance GapRequired Action
Unified Audit Log (E3)180 daysDoes not meet HIPAA 6-year or SOX 7-yearUpgrade to E5 or use third-party archival
Unified Audit Log (E5)1 year default, up to 10 yearsRequires explicit policy configurationCreate Audit Log Retention Policies in Microsoft Purview
Exchange Message Trace10 days (detailed), 90 days (summary)Insufficient for security investigationUse Purview eDiscovery or third-party archival
Defender for Endpoint Timeline180 daysGenerally sufficient; verify against policyEnable raw data export for longer retention
Defender Advanced Hunting30 daysVery limited for threat huntingStream to Sentinel or external SIEM

M365 Best Practice: E5 licensing with Purview Audit (Premium) retention policies is required for multi-year compliance. Configure Microsoft Graph API export for independent archival of critical logs.


Google Cloud Platform (GCP)

ServiceDefault RetentionCompliance GapRequired Action
Cloud Audit Logs (Admin Activity)400 daysMeets PCI-DSS; insufficient for HIPAA/SOXConfigure log sink to Cloud Storage with retention policy
Cloud Audit Logs (Data Access)30 daysDoes not meet any major frameworkEnable and route to Cloud Storage immediately
Cloud Audit Logs (System Event)400 daysSame as Admin ActivityConfigure sink for longer retention
Cloud Logging (Application)30 daysInsufficientCreate log sink; configure Cloud Storage lifecycle
VPC Flow Logs30 daysInsufficientExport via log sink to Cloud Storage
Cloud Load Balancing Logs30 days in LoggingInsufficientConfigure export to BigQuery or Cloud Storage

GCP Best Practice: Create organization-level log sinks to Cloud Storage with Object Lifecycle Management. Use BigQuery for queryable long-term retention of security-critical logs.


Security and Identity Platforms

PlatformServiceDefault RetentionRequired Action
CrowdStrikeFalcon ConsoleLimited query windowEnable Falcon Data Replicator (FDR) to S3
OktaSystem Log90 daysConfigure Log Streaming to SIEM or cloud storage
DuoAdmin Logs180 daysUse Admin API for export to long-term storage
SentinelOneDeep Visibility14 days defaultUpgrade retention tier or export to SIEM
ZscalerLog Retention6 months typicalConfigure Nanolog Streaming Service (NSS) for archival
Palo AltoCortex Data LakeLicense-dependentVerify contract terms; configure Log Forwarding App

SaaS and Collaboration Platforms

PlatformDefault RetentionCompliance GapRequired Action
Slack (Business+)1 year messages; audit logs varyMay require Enterprise GridConfigure Enterprise Grid with Discovery API export
Slack (Enterprise Grid)ConfigurableRequires explicit policySet org-wide retention; use Audit Logs API
GitHub Enterprise180 days audit logInsufficient for most complianceUse Audit Log Streaming to SIEM or cloud storage
SalesforceSetup Audit Trail 180 daysInsufficientEnable Salesforce Shield Event Monitoring; export
Atlassian CloudAudit logs 180 daysInsufficientUse Atlassian Access (Premium) with SIEM forwarding
BoxEnterprise Events 7 years (Enterprise plan)Generally compliantVerify plan level; enable Events Stream for SIEM
Zoom1 year for most logsVerify against requirementsUse Zoom Reports API for archival export
ServiceNowTable rotation policies varyCheck specific tablesConfigure archive tables; export to data lake

Infrastructure and Database

PlatformDefault RetentionCompliance GapRequired Action
Kubernetes Audit LogsNode-local; lost on terminationCritical gapDeploy Fluentd/Fluent Bit to ship to persistent storage
Docker Container LogsNone (ephemeral)Complete gapConfigure logging driver to persistent storage
MongoDB Atlas30 days audit logsInsufficientConfigure third-party log integration
SnowflakeQuery History 365 daysGenerally meets PCI-DSSUse Account Usage views for longer analysis
Elastic CloudIndex lifecycle dependentMust configure ILMSet Index Lifecycle Management policies

Storage Tier Implementation

Effective log retention balances access speed, storage cost, and compliance requirements.

TierTypical RetentionStorage TypeUse CaseRelative Cost
Hot1-7 daysSSD/NVMe, Fully IndexedReal-time alerting, active investigations$$$$$ (Highest)
Warm30-90 daysHDD/Hybrid, Partially IndexedHistorical analysis, threat hunting$$$ (Moderate)
ColdMonths to 1 yearObject Storage (S3 Standard-IA, Azure Cool)Compliance retention, infrequent forensics$$ (Low)
Frozen/ArchiveYears (1-7+)Glacier, Archive Tier, TapeLong-term compliance, legal hold$ (Lowest)

Cost optimization strategies:

  • Compression: Most log data compresses 80-90%
  • Selective retention: Full fidelity for security logs; sampled/aggregated for operational logs
  • Log level adjustment: Reduce DEBUG/TRACE in production unless actively troubleshooting
  • Deduplication: Eliminate redundant log collection paths

Secure Destruction Requirements

When retention periods expire, logs must be securely destroyed following NIST SP 800-88 Guidelines for Media Sanitization:

Clear: Logical techniques (overwriting) protecting against simple recovery. Acceptable for non-sensitive data on media being reused within the organization.

Purge: Physical or logical techniques (degaussing, cryptographic erase) rendering recovery infeasible with state-of-the-art laboratory techniques. Required for sensitive data on media leaving organizational control.

Destroy: Physical destruction (shredding, incineration, disintegration) rendering recovery infeasible and the media unusable.

Documentation requirement: Maintain destruction certificates including date, method, personnel performing destruction, and verification method. Retain destruction certificates for minimum 7 years.


Implementation Checklist

For each cloud service and SaaS platform in your environment:

  • [ ] Document default retention period for each log-generating service
  • [ ] Identify controlling compliance requirement (use most restrictive)
  • [ ] Calculate retention gap (required period minus default)
  • [ ] Configure export/streaming to long-term storage
  • [ ] Set lifecycle policies for tiered storage transitions (hot → warm → cold → archive)
  • [ ] Verify log integrity controls (immutability, checksums, WORM where required)
  • [ ] Test retrieval from cold/archive storage before audit
  • [ ] Document configuration in system security plan
  • [ ] Establish automated alerts for retention policy failures
  • [ ] Schedule annual review of retention requirements against framework updates

Authoritative Sources and Resources

Primary Regulatory Sources

Payment Card Industry

Healthcare (HIPAA)

Financial (SOX, SEC, FINRA, GLBA)

Federal Guidance (NIST)

International Standards

Industry Best Practices

Privacy Regulations

Employment and Safety

Cloud Platform Documentation

Amazon Web Services

Microsoft Azure

Microsoft 365

Google Cloud Platform


Glossary

TermDefinition
Audit TrailChronological record providing documentary evidence of the sequence of activities affecting a specific operation, procedure, or event
Business AssociateUnder HIPAA, a person or entity performing functions involving use or disclosure of PHI on behalf of a covered entity
Chain of CustodyDocumentation showing seizure, custody, control, transfer, analysis, and disposition of evidence
Covered EntityUnder HIPAA: health plans, healthcare clearinghouses, and healthcare providers transmitting health information electronically
CUIControlled Unclassified Information requiring safeguarding per law, regulation, or government-wide policy
ePHIElectronic Protected Health Information created, stored, transmitted, or received electronically
Hot StorageHigh-performance, immediately accessible storage (SSD/NVMe) for real-time analysis
Litigation HoldLegal requirement to preserve all relevant documents when litigation is reasonably anticipated
SIEMSecurity Information and Event Management technology aggregating, correlating, and analyzing security events
WORMWrite Once Read Many storage preventing modification or deletion after initial write

Ready to Test Your Knowledge?


This document provides general guidance based on publicly available regulatory requirements as of January 2026. Organizations should consult qualified legal counsel and compliance professionals to determine specific obligations. Retention requirements are subject to change through regulatory amendment. Always verify against primary authoritative sources.

Author

Derrick Jackson

I’m the Founder of Tech Jacks Solutions and a Senior Director of Cloud Security Architecture & Risk (CISSP, CRISC, CCSP), with 20+ years helping organizations (from SMBs to Fortune 500) secure their IT, navigate compliance frameworks, and build responsible AI programs.

Leave a comment

Your email address will not be published. Required fields are marked *