RCIT-10 Reeves County Log management Policy
Policy Title: |
RCIT Reeves County Log Management Policy |
|||
Policy Number |
RCIT-10 |
Effective Date: |
09/01/2022 |
|
Purpose: |
RCIT Log Management Policy |
|||
Regulation Reference |
|
Rev: 1.202204 |
||
IT Reeves County Log Management Policy
Policy Statement:
Effective log management is crucial for the operational management and security of IT resources within the IT Reeves County. This policy outlines the guidelines for monitoring logs generated by IT resources to ensure compliance with operational and security requirements.
Guidelines:
1. Scope:
- This policy applies to the administration and use of all IT resources within the IT Reeves County.
- Users are prohibited from disabling or altering log settings on any IT resource, unless directed by the IT Department.
2. Log Management and Monitoring:
- The IT Department is responsible for managing and monitoring logs to ensure authorized access, troubleshoot systems, protect against unauthorized access, and comply with policies, contracts, and legal obligations.
- Events logged include Operating System events, audit records, application account information, and application operations.
- Logged details include timestamp, event type, status/error codes, user/system account, and device information.
3. Log Management and Monitoring: Critical Systems:
- Administrators of critical systems are responsible for monitoring event logs.
- Critical system logs capture additional information, including individual user access to systems with Protected Information, administrative actions, and changes to identification/authentication mechanisms.
4. Log Security and Retention:
- Logs are kept secure and accessible only to authorized individuals designated by the IT Reeves County’s Director of Information Security.
- Retention periods vary based on log type and sensitivity of information, complying with functional use, policies, contracts, and applicable laws.
5. Policy Administration and Enforcement:
- Administered and implemented by the IT Reeves County IT Department.
- Exception requests can be submitted through the RCIT Help desk procedure.
- Violations may result in disciplinary actions, access restrictions, termination, and potential legal consequences.
- Employment terms align with collective bargaining agreements between the IT Reeves County and unions.