You are the CISO of a company, and you need to create logging policies. Please review NIST SP800-92, Guide to Computer Security Log Management, specifically Section 2: “Introduction to Computer Security Log Management” and Section 5: “Log Management Operational Processes.”
Think about the various systems on a network, and develop a logging policy based on the information in the aforementioned sections.
Create a 2-page Word document on your policy. Be sure to discuss and include in your paper the following:
-
device type
-
log generation
-
log transmission
-
log storage and disposal
-
log analysis
Your paper should be 2 pages in length, plus screenshots as appropriate. Be sure to use appropriate APA format and cite your reading or other sources that you used in your paper.
The paper should contain sufficient information to adequately answer the questions and contain no spelling, grammar, or APA errors. Points deducted from grade for each writing, spelling, or grammar error are at your instructor’s discretion.
Please be sure to download the file “Writing Center Resources” from Course Documents.
Also review the university policy on plagiarism.
Struggling with where to start this assignment? Follow this guide to tackle your assignment easily!
Step 1: Read and Understand NIST SP800-92
-
Focus on Section 2 (Introduction to Computer Security Log Management) and Section 5 (Log Management Operational Processes).
-
Take notes on how logs are generated, transmitted, stored, analyzed, and eventually disposed of.
-
Highlight best practices for policy creation.
Resource: NIST SP 800-92 Guide to Computer Security Log Management (PDF)
Step 2: Draft Your Introduction
-
Begin your paper by explaining why log management is critical for cybersecurity and compliance.
-
Briefly introduce your company (real or hypothetical) and outline the purpose of the logging policy.
Example: “As the Chief Information Security Officer (CISO) of XYZ Corporation, I am tasked with ensuring effective log management across all systems to support security monitoring, compliance, and forensic analysis.”
Step 3: Develop Policy Sections
Organize your policy into five clear sections (each about half a page).
-
Device Type
-
List the types of devices (servers, firewalls, routers, intrusion detection systems, workstations, cloud resources, etc.).
-
Explain why logging each type is important.
-
-
Log Generation
-
Describe what events should be logged (e.g., user logins, configuration changes, failed login attempts, security alerts).
-
Ensure logs are timestamped and standardized for consistency.
-
-
Log Transmission
-
Explain how logs are securely transmitted (e.g., using encrypted channels such as TLS or VPNs).
-
Discuss centralized log collection (e.g., Security Information and Event Management—SIEM).
-
-
Log Storage and Disposal
-
Outline how logs are stored (centralized repository, cloud-based solutions, backups).
-
Define retention periods (e.g., 90 days for operational logs, 1 year for compliance-related logs).
-
Specify secure disposal methods (encryption wipe, shredding storage media).
-
-
Log Analysis
-
Explain how logs will be analyzed (manual review, automated SIEM tools, anomaly detection).
-
Include escalation procedures when suspicious activities are detected.
-
Step 4: Write the Conclusion
-
Summarize how your logging policy ensures security, compliance, and operational efficiency.
-
Reinforce the importance of continuous monitoring and regular policy updates.
Step 5: Format in APA Style
-
Use Times New Roman, 12 pt font, double-spacing.
-
Add a title page with assignment details.
-
Include in-text citations and a reference list (APA 7th edition).
Resource: Purdue OWL APA Formatting Guide
Step 6: Add Screenshots (Optional but Recommended)
-
Take screenshots of example system logs or SIEM dashboards.
-
Insert them into the appendix to strengthen your paper.
By following these steps, your final paper will:
-
Be 2 full pages in APA format.
-
Clearly cover all required sections.
-
Demonstrate your understanding of NIST SP800-92 best practices.
Remember! It’s just a sample. Our professional writers will write a unique paper for you.
Leave a Reply