Logging & Audit complete

Control over audit trails, log storage, monitoring systems, and forensic capabilities

L0 Unaware

No logging strategy exists. Default provider logs may be active but are neither reviewed nor governed. There is no retention policy, no audit trail, and no forensic capability.

Criteria

  • AUDIT-L0-C1 The organisation has no awareness of which external parties generate, store, or have access to its operational logs.
    Evidence guidance

    Ask the organisation to identify where its logs are stored and who can access them. Inability to answer satisfies this criterion.

  • AUDIT-L0-C2 Logs exist only as provider defaults (e.g., basic cloud console activity logs) and are neither actively monitored nor forwarded to any centralised system.
    Evidence guidance

    Review cloud provider logging configurations and ask operations staff whether any log aggregation or review process exists.

Indicators

  • No one in the organisation can describe where logs are stored or what events are captured.
  • Security incidents are discovered by end users or customers rather than through monitoring systems.
  • The organisation has never performed a log-based forensic investigation.
  • Provider default log retention periods are unknown to IT staff.

Regulatory mappings

RegulationArticlesRiskNote
GDPRart-5, art-30criticalGDPR Art. 5(2) requires demonstrable accountability. Without audit trails the organisation cannot prove compliance with processing principles. Art. 30 mandates records of processing activities, which are impossible to verify without logging.
NDSGart-8highnDSG Art. 8 requires appropriate technical measures to ensure data security. Complete absence of logging prevents detection of unauthorised access or data breaches.
NIS2art-21highNIS2 Art. 21(2)(g) requires policies on security monitoring and logging. Total absence of a logging strategy constitutes non-compliance for in-scope entities.

Upgrade path

Define a baseline logging policy identifying critical systems and the events that must be captured. Enable provider-native logging services (CloudWatch, Azure Monitor, GCP Cloud Logging) with explicit retention periods. Assign ownership for log review to a named individual or team.

Risk if stagnant

Without any logging capability the organisation is blind to security incidents, unable to support forensic investigations, and cannot demonstrate regulatory compliance. Breach detection time extends to months or years, significantly increasing the impact of any compromise.

Typical characteristics
  • No logging policy. There is no document defining which events should be logged, where log data should reside, or how long it must be retained. Logging is treated as a provider implementation detail rather than a governance concern.
  • Invisible log lifecycle. Logs may be silently created and silently expired according to provider defaults. The organisation is unaware of the retention window and has never verified whether logs are available when needed.
  • No monitoring or alerting. No dashboards, alerting rules, or scheduled log reviews exist. Anomalous behaviour - failed logins, privilege escalations, data exports - goes unnoticed unless it causes a visible outage.
  • No forensic readiness. In the event of a security incident, the organisation cannot reconstruct a timeline of events because the necessary log data either does not exist or cannot be located.
Why this is dangerous

Logging is the foundation of accountability. Without audit trails, the organisation cannot determine who accessed what data, when, and from where. This makes it impossible to detect breaches in a timely manner, to comply with the 72-hour breach notification requirement under GDPR Art. 33, or to provide regulators with evidence of compliance.

From a sovereignty perspective, the absence of logging means the organisation cannot even assess whether a foreign jurisdiction has accessed its data. If a US-headquartered cloud provider receives a CLOUD Act order, there is no audit trail to reveal that data was disclosed.

Sovereignty implications

Sovereignty requires visibility. An organisation that cannot observe its own systems cannot govern them. At Level 0, the question of log sovereignty is moot - there is no log data over which to exercise sovereignty.