Logging


  1. Financial entitiesas defined in Article 2, points (a) to (t) shall, as part of the safeguards against intrusions and data misuse, develop, document, and implement logging procedures, protocols and tools.

  2. The logging procedures, protocols, and tools referred to in paragraph 1 shall contain all of the following:

    1. the identification of the events to be logged, the retention period of the logs, and the measures to secure and handle the log data, considering the purpose for which the logs are created;

    2. the alignment of the level of detail of the logs with their purpose and usage to enable the effective detection of anomalous activities as referred to in Article 23;A typographical error has been corrected here. The original authentic source said: Article 24;

    3. the requirement to log events related to all of the following:

      1. logical and physical access control, as referred to in Article 21, and identity management;

      2. capacity management;

      3. change management;

      4. ICT operations, including ICT system activities;

      5. network traffic activities, including ICT network performance;

    4. measures to protect logging systems and log information against tampering, deletion, and unauthorised access at rest, in transit, and, where relevant, in use;

    5. measures to detect a failure of logging systems;

    6. without prejudice to any applicable regulatory requirements under Union or national law, the synchronisation of the clocks of each of the financial entity’s ICT systems upon a documented reliable reference time source.

    For the purposes of point (a), financial entitiesas defined in Article 2, points (a) to (t) shall establish the retention period, taking into account the business and information security objectives, the reason for recording the event in the logs, and the results of the ICT riskany reasonably identifiable circumstance in relation to the use of network and information systems which, if materialised, may compromise the security of the network and information systems, of any technology dependent tool or process, of operations and processes, or of the provision of services by producing adverse effects in the digital or physical environment assessment.