CDP 35948466: Enable Logging (app) #19
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
CDP Control ID:
35948466Category: Administrator Access
Frequency: Annually
Owner: h.noerenberg
Parent: #1
Requirement & Guidance
Administrator Access Requirement: Enable logging on all operating systems, databases, applications, security and network devices where highly confidential data resides. Logs must be kept for a minimum of 6 months or as per contractual/legal requirement. Guidance: An administrator is a person who is responsible and has full access for the upkeep, and reliable operation of computer operating systems, databases, networks, and/or applications; the administrator may be involved with account creations, installations, and upgrades. Confirm that logging has been enabled and logs are maintained as required. Additional information can be found on CDP website Administrator Access
CapaKraken Action Plan — 35948466 Enable Logging
Scope: Logging auf OS/DB/App/Network wo Highly Confidential Data liegt. ≥ 6 Monate Aufbewahrung.
Aktueller Stand:
docs/acn-security-compliance-status.md3.2.7.01 OK — Application Event Logging (Auth failures, config changes, API errors, high-risk ops)ActivityLog/AuditEntryDB-TablesTodos:
AuditEntry.retainDays = 180+(aktuell?)log_destination,log_statement='ddl',log_connections,log_disconnectionsprüfen (→docs/security-architecture.mdSek. 12 hat pg_hba/SSL Empfehlungen, Audit-Flags hinzufügen)docs/nginx-hardening.conf)Dateien:
packages/api/src/lib/logger.ts,docs/nginx-hardening.confCapaKraken Compliance-Status
EAPPS-Mapping:
3.2.7.01Status: ✅ OK (laut
docs/acn-security-compliance-status.md)Zusammenfassung
Strukturiertes Logging (Pino) für Auth-Failures, Config-Changes, API-Errors, High-Risk-Ops und externe API-Calls; zusätzlich Audit-Entries in der DB.
Nachweis
/api/cron/auth-anomaly-check—apps/web/src/app/api/cron/auth-anomaly-check/route.ts/api/cron/security-audit—apps/web/src/app/api/cron/security-audit/route.tsEntscheidung: Control ist nachweislich erfüllt → Ticket wird geschlossen.