Most organizations don’t discover breaches themselves. According to IBM’s Cost of a Data Breach Report, the average time to identify a breach is over 200 days. Two hundred days of an attacker in your environment, and the most common reason it takes that long is that nobody was watching the logs — or worse, the logs didn’t exist. You can’t detect what you can’t see. You can’t investigate what wasn’t recorded. And you can’t prove what happened to regulators, courts, or your board without evidence.

A security logging pipeline is the foundation of detection and response. Not a SIEM license collecting dust, not a log server filling up with unreviewed data — a pipeline that collects the right logs, puts them in one place, keeps them long enough, alerts on what matters, and protects the evidence from tampering. Here’s how to build one.

DO / DON’T

DO:

DON’T:

What to Log

Not all logs are created equal. Focus on the sources that provide the most security value per byte stored.

Tier 1: Must Have (Day One)

These log sources provide the foundation for security monitoring. If you log nothing else, log these.

Authentication and access:

System changes:

Network security:

Tier 2: Should Have (Month One)

Application-level:

Endpoint:

Tier 3: Nice to Have (Quarter One)

NIST SP 800-92 provides comprehensive guidance on log management, including what to log, how to manage log data, and log analysis. CISA’s Logging Made Easy project provides free tools and guidance for organizations getting started.

Centralized Log Collection

Architecture

Logs need to flow from sources to a central platform in real time. The basic architecture:

[Log Sources] --> [Collection/Shipping] --> [Ingestion/Parsing] --> [Storage/Index] --> [Search/Alert]

Collection agents:

SIEM platforms:

The platform matters less than the commitment to using it. An open-source SIEM with well-tuned detection rules and an analyst reviewing alerts daily outperforms an expensive SIEM that’s collecting logs nobody looks at.

Log Parsing and Normalization

Raw logs from different sources use different formats: syslog, JSON, CSV, Windows Event XML, proprietary formats. Normalize them into a common schema so you can correlate events across sources.

The Elastic Common Schema (ECS) and OCSF (Open Cybersecurity Schema Framework) provide standardized field mappings. Normalizing means that “source_ip” from your firewall and “ClientIP” from your web server both map to the same field in your SIEM. Without normalization, cross-source correlation is manual and painful.

Retention Policy

How Long to Keep Logs

Retention is a balance between forensic value, compliance requirements, and storage costs.

Log Type Minimum Retention Rationale
Authentication 1 year Compliance (PCI-DSS requires 1 year, 3 months immediately available). Forensic investigation of long-dwell-time breaches.
Firewall/network 90 days - 1 year Network forensics, lateral movement investigation.
Application access 90 days - 1 year User activity investigation, insider threat.
System/configuration changes 1 year Change attribution, root cause analysis.
DNS queries 90 days C2 detection, data exfiltration investigation.
Full packet capture 7-30 days Storage-intensive; keep only for critical segments.

Regulatory requirements set the floor:

Use tiered storage: hot storage (fast search, recent data) for 30-90 days, warm storage (slower search, older data) for the remainder of your retention period, cold/archive storage (retrieval takes hours) for long-term compliance retention.

Alert Tuning

The Alert Fatigue Problem

An untuned SIEM generates thousands of alerts per day. Analysts start ignoring them. The real attack hides in the noise. Alert fatigue is the number one reason organizations with SIEMs still miss breaches.

How to Tune

Start with high-fidelity detections:

Reduce noise:

Measure alert quality:

Log Integrity

Why Log Integrity Matters

If an attacker can modify or delete logs after compromising a system, they can erase evidence of the breach, hide their persistence mechanisms, and make forensic investigation impossible. Protecting log integrity is protecting your ability to detect, investigate, and prove what happened.

How to Protect Logs

If It Already Happened

If you’re investigating an incident and discovering that the logs you need don’t exist or have been tampered with:


Logs are evidence, detection, and accountability. Start with authentication logs — every login, every failure, every privilege change. Centralize them today. Set up three high-fidelity alerts. Tune them until they’re actionable. Then expand: add network logs, application logs, endpoint logs, one source at a time. The pipeline you build now determines whether you catch the next breach in hours or discover it in months.