Updated At Mar 16, 2026
Key takeaways
- Treat logs as an evidence supply chain, not just an operations tool, so leadership can rely on them during incidents, audits, and board reporting.
- Map systems and data classes to risk-based retention and deletion rules that still respect Indian regulatory baselines like mandatory 180-day log retention where applicable.[3]
- Engineer audit trails for forensic credibility with integrity controls, time synchronisation, access governance, and documented chain of custody.
- Define an operating model (RACI, workflows, health checks) spanning security, SRE, data, compliance, and legal so the evidence program is sustainable.
- Evaluate internal platforms and vendors on logging, retention configurability, exportability, integrity guarantees, and India-region storage options.
From logs to evidence: why leadership and regulators care
- Do we know which systems and data classes are in scope for retention and audit trails?
- Are we meeting minimum regulatory expectations in India while still practising data minimisation?
- Are our logs complete, tamper-resistant, and time-synchronised enough to reconstruct incidents?
- Can we demonstrate, with metrics and reports, that our controls are operating as designed?
Core concepts: retention, deletion, audit trails, and the evidence lifecycle
- Event: A discrete action or state change in a system or application (e.g., a login attempt, a configuration change, a database query).
- Log: A record of one or more events emitted by a component (server, application, device, service) with associated metadata such as timestamp, user, source IP, and outcome.
- Audit trail: A structured, chronological sequence of records that shows who did what, when, where, and (optionally) why, in relation to a system, dataset, or business process. Audit trails are typically a curated subset of logs with stronger integrity and access controls.
- Retention: The period for which logs or audit trails are stored in an accessible form before being archived or destroyed, driven by risk, regulation, and business needs.
- Deletion: The intentional, controlled destruction or anonymisation of log data once the retention period or purpose has expired, documented so that you can prove it happened as planned.
- Evidence: A set of log-derived artefacts (queries, exports, screenshots, reports) you can use to support or refute a claim during an incident investigation, internal review, or external audit.
Regulatory and assurance drivers for Indian organisations
| Regulation / Framework | Typical scope for logs | Expectation for retention & audit trails | Implication for your evidence program |
|---|---|---|---|
| CERT-In Directions (Section 70B(6)) | ICT systems operated by specified service providers, intermediaries, data centres, body corporates, and government entities in India. | Enable logging, retain logs for at least 180 days, and provide them to CERT-In upon request.[3] | Ensure covered systems are in your log inventory, have 180+ days of retrievable logs, and that you can respond quickly to CERT-In requests. |
| Digital Personal Data Protection (DPDP) Act, 2023 | Processing of digital personal data by data fiduciaries and processors. | Introduces principles such as lawful purpose, data minimisation, storage limitation, and security safeguards for personal data, which apply to logs containing such data.[4] | Design logging so that personal data in logs is limited, retained only as long as necessary for identified purposes, and protected with appropriate security controls. |
| ISO/IEC 27001 / 27002 | Information security management systems and controls across the organisation. | Expect logging and monitoring of user and system activities, especially privileged operations, with retention aligned to risk and business needs. | Define control objectives for logging and retention; ensure evidence can show that events are logged, reviewed, and retained as per the ISMS. |
| SOC 2-style audits | Service organisations providing services to global customers, including from India. | Expect evidence of logging and monitoring controls supporting security, availability, and confidentiality trust principles over the review period. | Prepare repeatable evidence packs (screenshots, exports, queries) that demonstrate how logs support control tests over time, not just at a point-in-time. |
Designing a risk-based log retention model
-
Inventory systems and log types by business serviceStart from critical business services and map all generating components: infrastructure, applications, databases, security tools, identity providers, and third-party SaaS. For each, identify log categories such as access, configuration, application events, database queries, and security alerts.
-
Classify data sensitivity and regulatory applicabilityFor each log source, flag whether it contains personal data, sensitive business data (e.g., financial transactions), or only technical metadata. Mark which systems fall under CERT-In Directions and other sectoral requirements so that the 180-day baseline for covered systems is clearly visible.[3]
-
Define baseline retention by class, then tune by systemCreate baseline retention periods for classes like “core infrastructure logs”, “authentication and access logs”, “security monitoring logs”, and “business transaction logs”. Ensure baselines meet or exceed applicable regulatory minima, such as maintaining logs for at least 180 days for in-scope ICT systems, then extend durations where investigation or contractual needs justify it.[3]
-
Apply data minimisation and storage limitation for personal data in logsWhere logs contain personal data, balance longer retention for security and auditability with the principle that personal data should be limited to what is necessary and retained only for as long as needed for specified purposes.[4]
-
Validate with stakeholders and codify as a retention scheduleReview proposed retention durations with security, legal, compliance, data privacy, and business owners. Capture the agreed periods, rationales, and responsible owners in a formal log retention schedule that can be referenced in policy and during audits.
| System / Log class | Data sensitivity / content | Baseline requirement | Proposed retention (hot + archive) | Rationale (risk, investigation, contracts) |
|---|---|---|---|---|
| Core infrastructure logs (compute, network, storage in India DC/region) | Technical metadata; may include IPs, hostnames, system accounts; limited personal data. | 180+ days for covered ICT systems, if within scope of CERT-In Directions.[3] | 180 days hot, 1–2 years in lower-cost archive. | Needed to support incident reconstruction, capacity planning, and some audit look-back periods. |
| Authentication and access logs (IdP, VPN, PAM, admin consoles) | High-sensitivity: user identifiers, roles, privileged activity, source IPs; often personal data. | Regulatory minima where applicable (e.g., 180+ days) plus contractual expectations; also subject to storage limitation for personal data.[3] | 1 year hot, 2–3 years archive (subject to data protection review). | Crucial for detecting and investigating account compromise, fraud, and insider threats over a longer horizon. |
| Business transaction logs (payments, orders, policy changes) | Business-critical data; often financial or contractual; may include personal data and regulatory records. | Driven by financial, tax, or sectoral record-keeping rules and contracts; no single generic minimum. | 3–7+ years depending on legal and contractual requirements agreed with counsel and finance/risk. | Supports dispute resolution, fraud investigations, and statutory record-keeping obligations. |
Making deletion and archival defensible
-
Separate hot, warm, and cold log tiers with explicit purposesUse your SIEM or log platform for hot and warm data (recent, searchable) and object storage or archive services for cold data. Document the purpose of each tier so you can justify why data remains online or archived and when it should be destroyed or anonymised.
-
Automate lifecycle policies rather than manual deletion requestsImplement lifecycle policies in your cloud storage, log management tools, and data lakes that move logs between tiers and delete or anonymise them when retention periods expire. Manual ad hoc deletion is hard to prove and easy to get wrong.
-
Minimise and transform sensitive data in logs up frontAvoid logging unnecessary personal data and secrets; mask or hash identifiers where possible; and use tokenisation or pseudonymisation to reduce linkability while still supporting investigations and analytics.[2]
-
Maintain an auditable trail of deletions and overridesLog lifecycle events themselves: policy configuration changes, successful lifecycle runs, manual overrides, and exceptions. This meta-logging lets you demonstrate that data minimisation is actually enforced and explains why certain records were retained longer or deleted earlier.
Engineering tamper-resistant audit trails
- Integrity: Logs are written to append-only or write-once storage where deletion and modification are restricted, logged, and monitored (e.g., WORM storage, object lock, or signed log streams).
- Completeness: Critical events are captured across infrastructure, applications, identity, and security tooling, with minimal blind spots for privileged actions and configuration changes.
- Time synchronisation: All major components use a common, reliable time source so that cross-system timelines can be reconstructed without ambiguity.
- Access control: Only a limited set of roles can administer logging infrastructure, and read access to sensitive logs (e.g., containing personal or financial data) is tightly governed and logged.
- Security-focused content: Logs include the information needed to detect and investigate suspicious behaviour (e.g., user IDs, source IPs, key parameters) but avoid highly sensitive data such as passwords or full authentication tokens.[2]
- Chain of custody: When logs are exported for investigations or audits, there is a recorded trail of who exported what, when, from which system, and how integrity was preserved (e.g., checksums, signatures).
Building the evidence program operating model
| Role / Team | Primary responsibilities in the evidence program |
|---|---|
| CISO / Security leadership | Own the overall evidence program strategy, approve retention and deletion policies, and ensure alignment with risk appetite and regulatory expectations in India and key markets. |
| Security operations / Detection & response | Define logging requirements for security monitoring, run the SIEM/SOC processes, and validate that logs are sufficient for investigation and threat detection use cases. |
| Platform / SRE / Cloud teams | Implement log collection and forwarding across infrastructure and platform services, manage storage tiers, and ensure reliability and performance of the logging pipeline. |
| Application owners / Engineering leads | Implement application-level logging and audit trails in code and configuration, following central standards and ensuring that critical business and access events are captured. |
| Data / Analytics engineering | Manage log data in data lakes, optimise storage and query patterns, and support evidence pack generation and metrics dashboards for leadership and audits. |
| Compliance, risk, and privacy teams | Translate regulatory and contractual obligations into control requirements, review retention schedules, and coordinate internal and external audits related to logging and evidence. |
| Legal | Advise on legal interpretations, cross-border log transfers, data residency concerns, and how logs may be used in disputes or regulatory proceedings. |
-
Onboard new systems with a standard logging checklistAny new product, service, or major third-party integration should go through a logging checklist covering log sources, events to capture, retention class, data sensitivity, and responsible owner. Ideally this is built into your change or architecture review process.
-
Control changes to retention and deletion policies via change managementTie changes to log retention and deletion rules to formal change requests. Capture risk and regulatory impact analysis, approvals from security and compliance, and post-change verification that policies are working as intended.
-
Run periodic health checks and control testing of logging coverage and integrityOn a defined cadence (e.g., monthly or quarterly), test whether key systems are still sending logs, retention rules are enforced, time is synchronised, and audit trails cover privileged and sensitive operations. Document test results and remediation actions as part of your evidence set.
-
Standardise evidence packs for audits and investigationsCreate templates for recurring audit requests (e.g., “show privileged access changes in the last 12 months”) and incident investigations. Pre-define queries, export formats, and supporting screenshots so teams can respond rapidly and consistently.
Tooling and vendor evaluation criteria for logging and audit
- Retention configurability: Can you configure retention by log type, tenant, or dataset to enforce your schedule and regulatory minima?
- Export and query capabilities: Can you run complex queries, export raw logs and reports in standard formats, and automate evidence pack generation via APIs?
- Integrity and tamper-resistance: Does the platform support append-only storage, object lock, hashing, or signing of logs, with audit trails for administrative actions on logging configuration?
- Data residency and India-region storage: Can logs, particularly those containing personal or sensitive data, be stored and processed in India regions where required, with clear options and documentation for cross-border transfers?
- Access control and multi-tenancy: Are logs logically separated between customers or business units, with role-based access controls and comprehensive access logging?
- Integration with your SIEM and data lake: Can logs be streamed or batch-loaded into your central tooling with consistent schemas, timestamps, and identifiers?
| Dimension | Questions to ask | Potential red flags |
|---|---|---|
| Retention control | How do we configure retention per log type? Can we apply different policies by tenant, region, or environment (prod vs test)? | Single global retention setting with no flexibility; changes require vendor support tickets; no visibility into actual enforcement. |
| Evidence export | Can we export raw logs and reports for a specified time range and filter, with consistent timestamps and integrity checksums? | Only screenshots or pre-defined reports are available; no raw export or API access for evidence generation. |
| Data residency | Where are logs stored and processed by default? Are India-region options available? How are cross-border transfers controlled and documented? | Logs (including those with personal data) can only be stored outside India with limited transparency or control over transfer mechanisms and sub-processors. |
| Integrity and administration | What prevents administrators from altering or deleting logs without trace? Are configuration changes and log deletions themselves logged and reportable? | No append-only or tamper-evident options; admin actions on logs are not logged or are only partly visible to customers. |
Implementation roadmap and metrics for continuous assurance
-
Baseline and gap assessment (0–3 months)Inventory current log sources, retention settings, and audit trail coverage. Identify systems in scope of CERT-In Directions and where personal data is present in logs. Document major gaps: missing logs, insufficient retention, lack of integrity controls, or unclear ownership.[3]
-
Design and pilot (3–6 months)Define your retention schedule, operating model, and target architecture. Pilot the new controls with a few critical services (e.g., customer-facing apps) and a limited set of teams, refining playbooks for investigations and audits based on real usage.
-
Scale and integrate (6–12 months)Extend the model to more systems, including key third-party SaaS platforms, and integrate with incident management, ticketing, and change management. Automate lifecycle policies and evidence pack generation where possible.
-
Optimise and continuously improve (ongoing)Review metrics and audit findings to refine logging coverage, reduce noisy low-value logs, and adjust retention and deletion rules to evolving risk and regulatory interpretations.
Troubleshooting log evidence gaps
- Symptom: You cannot retrieve logs older than 90 days for a critical system. Likely cause: Default retention settings in the platform were never adjusted, or archive policies are misconfigured. Fix: Review the retention schedule, update platform policies, and backfill from any available backups or application-specific histories while you still can.
- Symptom: Privileged changes (e.g., firewall rules, IAM roles) are missing from audit trails. Likely cause: Admin actions are performed via channels that are not centrally logged or rely on local logs that are not shipped to your SIEM. Fix: Standardise on controlled admin paths (e.g., bastion hosts, approved consoles), enable and forward admin activity logs, and add periodic tests that simulate changes and confirm they appear in audit trails.
- Symptom: Timestamps don’t line up across systems, making timelines hard to reconstruct. Likely cause: Inconsistent time sources or incorrect timezone configurations in infrastructure and applications. Fix: Enforce a single, reliable time synchronisation mechanism across environments, log both UTC and local offsets where helpful, and include time-sync checks in your health monitoring.
- Symptom: Log volumes are exploding, but detection quality is not improving. Likely cause: Over-logging verbose, low-value events without focusing on security- and business-relevant signals; lack of sampling or filtering. Fix: Review logging guidance for each platform, remove or down-sample noisy events, and prioritise events tied to access, configuration, data access, and monetary or sensitive actions.
Common mistakes in log evidence programs
- Treating logging as a project, not a lifecycle: one-time SIEM deployment without ongoing coverage, retention, and integrity reviews.
- No clear distinction between operational logs and audit trails, leading to weak integrity controls for the very records you rely on in disputes or regulatory reviews.
- Over-collecting sensitive personal data in logs “just in case”, increasing privacy and breach impact without proportional investigation benefit.
- Ignoring third-party SaaS and managed services in log inventories, leaving significant blind spots in your evidence supply chain.
- Relying on manual, ad hoc queries for every audit request, instead of standardising evidence packs and automating recurring reports where feasible.
Common questions about log retention, deletion, and audit trails
FAQs
Basic logging focuses on collecting events for operations and debugging. An evidence program is a structured, cross-functional approach to ensure logs can be trusted and reused as evidence in incidents, audits, and regulatory interactions. It connects policies and regulations to concrete retention, deletion, and audit-trail controls, with defined ownership, metrics, and repeatable evidence packs.
The 180-day figure associated with CERT-In Directions is a baseline requirement for certain covered entities and systems, not a universal best-practice duration for all logs. Many organisations choose longer retention for key audit trails, access logs, and business transaction records based on risk, contracts, and other regulatory or tax requirements. The right answer for you should come from a documented risk assessment and consultation with legal and compliance teams.[3]
Start by inventorying which SaaS and cloud platforms are critical for your services and whether they store logs containing personal or sensitive data. For each, understand data residency options, log export capabilities, and contractual terms around security and compliance. Where logs involve personal data and may move across borders, work with legal and privacy teams to align with DPDP principles and any cross-border transfer requirements, and ensure key logs are integrated into your central evidence program.[4]
Start from use cases: what incidents, fraud scenarios, and audits must your logs support? Prioritise logging events related to authentication, authorisation, configuration changes, access to sensitive data, and business-critical actions. Avoid logging secrets, passwords, or excessive personal data, and tune out noisy, low-value events that add cost without improving detection or evidence quality.[2]
Leadership typically responds well to metrics framed in terms of risk reduction and readiness, such as:
- Coverage: percentage of crown-jewel systems integrated into central logging and evidence workflows.
- Retention compliance: percentage of log sources meeting their defined retention targets for the last reporting period.
- Readiness: average time to respond to a standard audit evidence request or to reconstruct an incident timeline for a critical system.
- Control health: number of failed logging or time-synchronisation checks detected and remediated in the last month or quarter.
For some services, especially global SaaS, logs may be generated or stored outside India by design. For logs that contain personal or regulated data, work with legal and privacy teams to determine whether cross-border storage and processing is appropriate under DPDP and any sectoral rules, and ensure contracts reflect your obligations. Where feasible, prefer options that allow logs to be stored or replicated in India regions, or at least provide clear visibility and control over where logs reside and how they are protected.[4]
Sources
- SP 800-92, Guide to Computer Security Log Management - National Institute of Standards and Technology (NIST)
- Logging Cheat Sheet - OWASP Foundation
- Directions under section 70B(6) of the Information Technology Act, 2000 (No. 20(3)/2022-CERT-In) - Indian Computer Emergency Response Team (CERT-In), Government of India
- The Digital Personal Data Protection Act, 2023 - Ministry of Law and Justice / Ministry of Electronics and Information Technology, Government of India