A Short Intro to Logging in the Cloud
?Logging is the systematic recording of events in an IT environment. It is the foundation for proactively identifying issues or analyzing what goes wrong, operation-wise and security-wise. Thus, systematic logging is essential for IT security. Suppose IT security teams are blind to components or specific events. In that case, they can neither detect ongoing attacks nor fully understand all the harm and manipulations caused by malware within their IT environments.
Unlike metrics, which provide aggregated values (e.g., server utilization) for quick decision-making, logs offer detailed records of individual events. For instance, a metric might count the number of failed logins, whereas a log documents the five failed login events coming from suspicious foreign countries as well as the thousands of daily authentication events.
Different teams need logs for various purposes:
From a security perspective, logs save two purposes:
These two purposes have different implications for log logistics. Threat detection should take place in (near-) real-time. The relevant logs are the raw data that must be sent to Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) tools, which analyze them and might respond automatically or raise an alarm to the security operations center (SOC).
SIEM costs often relate directly to the stored and processed data. Thus, pumping all log data into a SIEM is not an option, even though the more data a SIEM has, the more effective security analysts can work on threats. So, while security organizations must ensure all logs for threat detection and a first analysis are in the SIEM, they must also ensure that all potentially relevant log data needed for incident investigations are kept in a secure location, be it locally with the services and components producing the logs or consolidated log storage. It is crucial to prevent duplication of log data due to the massive amounts of data and cost implications. Other standard practices to reduce the amount of data in an SIEM are having shorter retention periods.
From a security perspective, the following log types are especially relevant:
For (resource) logs, understanding the differences between control plane and data plane logs is vital:
It is essential to know which data is irrelevant for threat detection and which data must go to the SIEM for in-depth analysis. Deciding which data is not relevant is also essential, especially with respect to data plane logs. When every click on a button in a banking app writes 1KB of log data, costs just for log storage explode.
So, logging is the cornerstone of cybersecurity, enabling organizations to detect threats and respond effectively to security incidents. While cloud platforms offer comprehensive logging capabilities, organizations must decide which logs they activate, where to store the log data, and which log data has to be forwarded to the company’s SIEM. Balancing visibility for security and costs is central to any effective cloud logging strategy.