{"id":3009,"date":"2022-01-10T09:43:00","date_gmt":"2022-01-10T08:43:00","guid":{"rendered":"http:\/\/10.24.225.70\/?p=3009"},"modified":"2026-04-20T22:57:14","modified_gmt":"2026-04-20T20:57:14","slug":"how-to-implement-a-log-management-system","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/how-to-implement-a-log-management-system\/","title":{"rendered":"How to implement a Log management system"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-1c95cc62 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-627ud4 is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns3009_1755b8-f9\"><a class=\"kb-button kt-button button kb-btn3009_eafe63-1a kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/complior.se\/en\/resources\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\">Tillbaka till resurser<\/span><\/a><\/div>\n\n\n\n<span class=\"kt-adv-heading3009_110aa5-87 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_110aa5-87\">Blog<\/span>\n\n\n\n<h1 class=\"kt-adv-heading3009_2ffb4f-69 animated fadeIn wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_2ffb4f-69\">How to implement a Log management system<\/h1>\n\n\n\n<div class=\"wp-block-group animated fadeIn is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"publish-date-container\">\r\n\t<svg\r\n\t\twidth=\"16\"\r\n\t\theight=\"16\"\r\n\t\tviewbox=\"0 0 24 24\"\r\n\t\tfill=\"none\"\r\n\t\tstroke=\"#4b4b4b\"\r\n\t\tstroke-width=\"2\"\r\n\t\tstroke-linecap=\"round\"\r\n\t\tstroke-linejoin=\"round\"\r\n\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\"\r\n\t\taria-hidden=\"true\"\r\n\t>\r\n\t\t<rect x=\"3\" y=\"4\" width=\"18\" height=\"18\" rx=\"2\" ry=\"2\"><\/rect>\r\n\t\t<line x1=\"16\" y1=\"2\" x2=\"16\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"8\" y1=\"2\" x2=\"8\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"3\" y1=\"10\" x2=\"21\" y2=\"10\"><\/line>\r\n\t<\/svg>\r\n\t<span class=\"date-text\">\r\n\t\tJan 10, 2022\t<\/span>\r\n<\/div>\n\n\n<div class=\"kt-adv-heading3009_6d01ea-e6 wp-block-kadence-advancedheading kt-adv-heading-has-icon animated fadeIn delay-100ms\" data-kb-block=\"kb-adv-heading3009_6d01ea-e6\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_clock kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 6 12 12 16 14\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">4 min <\/span><\/div><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image3009_e3f28e-c1 size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"529\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-1024x529.png\" alt=\"3 people climbing pedestals\" class=\"kb-img wp-image-51083\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-1024x529.png 1024w, https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-300x155.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-768x397.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-1536x794.png 1536w, https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-2048x1058.png 2048w, https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-18x9.png 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-5d0deba2 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-1rljnj8 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<p class=\"kt-adv-heading3009_dfd415-24 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_dfd415-24\">The implementation of a Company&nbsp;<a href=\"https:\/\/complior.se\/en\/log-management\/\">log management system<\/a>&nbsp;is often very difficult. Usually due to the lack of clear project objectives and because of the absence of the preparatory activities that are its foundation.<br><br><strong>There are two main types of log management systems:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"blockera-block blockera-block-1idqhgm has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">Information Management System<\/li>\n\n\n\n<li class=\"blockera-block blockera-block-ewg15n has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">Event Management System<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-exnlgk is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading3009_06e3b2-db wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_06e3b2-db\">The goals set for Information Management Systems and Event Management Systems are different<\/h2>\n\n\n\n<p class=\"kt-adv-heading3009_f085b7-ab wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_f085b7-ab\">An Information Management System is an access control solution that enables the generation, collection, analysis and storage of log files in order to preserve the confidentiality, integrity and availability of them. A log file contains an identifier uniquely associated to an individual, the time reference, and the command or query performed.<br><br>An Event Management System has the aim of finding the information for the detection of security incidents, within a huge amount of data, by using as source data from IDS\/IPS, log from network equipment or systems. It involves using data-mining query with correlation mechanisms to detect the \u201cpatterns\u201d associated with malware and\/or possible attacks.<br><br>From a pure technological point of view, the two aforementioned categories may have elements in common, nevertheless it is good to address the two tasks separately in distinct projects and then reuse common components, such as log collection, log parsing, etc.<br><br>In this post we will focus on the first type, highlighting all of the project stages required for its success.<br>A classic mistake is to think that a log management solution is solely based on the installation and configuration of a software package without keeping the real goals of the project in mind.<br>An Information Management System has two principal objectives:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"blockera-block blockera-block-9u4aji has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">Compliance with internal policies and\/or external regulations (in our case PCI DSS but could also be SOX, GDPR, etc.)<\/li>\n\n\n\n<li class=\"blockera-block blockera-block-v0hb7u has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">The need to maintain the computer evidences as protection from possible fraudulent activities involving customer personal data made by employees or third parties<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading3009_cfb099-bd wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_cfb099-bd\">The solution that will be implemented is strongly interconnected to the clear definition of these objectives.<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-2kbkzs is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading3009_e4a9b0-21 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_e4a9b0-21\">First phase: Account Survey and Cleaning <\/h3>\n\n\n\n<p class=\"kt-adv-heading3009_d9dd89-23 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_d9dd89-23\">A very good starting point is if the company has already implemented a solution of Identity and Access Management (IAM), otherwise it is necessary to provide a phase of user account survey and filtering. A prerequisite for a successful implementation of an IMS is that all user IDs are related to a unique person. Even application accounts must be associated with an employee. In the presence of privileged accounts it is necessary, as far as possible, to not allow direct access to the systems with those accounts, thus forcing the user to identify themselves with their personal username first.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-2kbkzs is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading3009_2bbfd2-3e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_2bbfd2-3e\">Second phase: LOG Production <\/h3>\n\n\n\n<p class=\"kt-adv-heading3009_f8627e-e8 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_f8627e-e8\">You collect payment from your customers online and you know it\u2019s your company\u2019s responsibility to keep that information secure, confidential and from getting hacked and released into the world of the Internet. It\u2019s your reputation, your brand and your customer\u2019s trust all on the line. So what exactly do you need to do for your business to both meet customer\u2019s expectations, the guidelines and standards set out by governing bodies? Do you need to hire an expert in-house or is there a reliable service you can partner with to outsource to comply?<br><br>Below we outline the ultimate guide for all you need to know about the Payment Card Industry Data Security Standard (otherwise referred to as PCI DSS) and options for your business.<br><br>&#8211; Windows<br>&#8211; Unix\/Linux<br><br>With Windows we have to deal with an operating system that has poor default trace, which saves the information in binary form and has difficulty tracking your activities related to access via remote control. The solution in this case is often the installation of market products that provide the agent and a console for the production of reports with access to the system and the file system objects. An appliance that records the remote sessions on the target platform, even in a video file, usually supports this kind of solution.<br>Unix\/Linux has far less problems. The solution then could be one that is the least invasive, like a customized shell writing all the commands in a file, typed inside an SSH session.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-jdjvts is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading3009_28d03e-65 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_28d03e-65\">Third phase: Collection and Protection <\/h3>\n\n\n\n<p class=\"kt-adv-heading3009_d5c80a-22 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_d5c80a-22\">For the collection of log files, when locally generated, there are two basic modes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"blockera-block blockera-block-kmzmrg has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">Push mode: sends the log file from the server to the central repository once the session is closed<\/li>\n\n\n\n<li class=\"blockera-block blockera-block-8dgknf has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">Pull mode: the transfer of the log file is centrally controlled<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading3009_11d467-18 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_11d467-18\">Pull mode has the advantage of easier management, while the push mode gives better assurance regarding the integrity of the file.<br><br>To ensure the integrity of the log files and to prevent that the log files generated by the system are not changed in subsequent periods after being created, there are various solutions that follow the same principle: on every log file, once removed from the source system, one must perform:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"blockera-block blockera-block-1bzpyrj has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">The calculation of the string hash<\/li>\n\n\n\n<li class=\"blockera-block blockera-block-17yqsxw has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">Writing of the timestamp with a centralized and synchronized time server (identification with hours, minutes, seconds, day, month and year) which marks the hash received calculating, at the same time, the digital signature<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading3009_9d6d4a-f9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3009_9d6d4a-f9\">At this point, the storage of the three elements is possible: the log file, string hash and timestamp. The last two making it possible to verify the reliability of the stored log file. Of course, it is not enough to produce a log file in court, but is more than sufficient for the purpose of PCI DSS compliance.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Implementation of a log management system is not easy due to lack of project objectives &#038; the preparatory activities that are its foundation<\/p>","protected":false},"author":2,"featured_media":51083,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"blogg","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":3,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[117,154],"class_list":["post-3009","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-blog","tag-log-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to implement a Log management system - Complior<\/title>\n<meta name=\"description\" content=\"Implementation of a log management system is not easy due to lack of project objectives &amp; the preparatory activities that are its foundation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/how-to-implement-a-log-management-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to implement a Log management system - Complior\" \/>\n<meta property=\"og:description\" content=\"Implementation of a log management system is not easy due to lack of project objectives &amp; the preparatory activities that are its foundation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/how-to-implement-a-log-management-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-10T08:43:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-20T20:57:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1323\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/how-to-implement-a-log-management-system\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/how-to-implement-a-log-management-system\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"How to implement a Log management system\",\"datePublished\":\"2022-01-10T08:43:00+00:00\",\"dateModified\":\"2026-04-20T20:57:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/how-to-implement-a-log-management-system\\\/\"},\"wordCount\":930,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/how-to-implement-a-log-management-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/how-to-implement-log-05-scaled.png\",\"keywords\":[\"Blog\",\"Log management\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/how-to-implement-a-log-management-system\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/how-to-implement-a-log-management-system\\\/\",\"name\":\"How to implement a Log management system - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/how-to-implement-a-log-management-system\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/how-to-implement-a-log-management-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/how-to-implement-log-05-scaled.png\",\"datePublished\":\"2022-01-10T08:43:00+00:00\",\"dateModified\":\"2026-04-20T20:57:14+00:00\",\"description\":\"Implementation of a log management system is not easy due to lack of project objectives & the preparatory activities that are its foundation\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/how-to-implement-a-log-management-system\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/how-to-implement-a-log-management-system\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/how-to-implement-a-log-management-system\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/how-to-implement-log-05-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/how-to-implement-log-05-scaled.png\",\"width\":2560,\"height\":1323,\"caption\":\"3 people climbing pedestals\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/how-to-implement-a-log-management-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to implement a Log management system\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to implement a Log management system - Complior","description":"Implementation of a log management system is not easy due to lack of project objectives & the preparatory activities that are its foundation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/how-to-implement-a-log-management-system\/","og_locale":"en_GB","og_type":"article","og_title":"How to implement a Log management system - Complior","og_description":"Implementation of a log management system is not easy due to lack of project objectives & the preparatory activities that are its foundation","og_url":"https:\/\/complior.se\/en\/how-to-implement-a-log-management-system\/","og_site_name":"Complior","article_published_time":"2022-01-10T08:43:00+00:00","article_modified_time":"2026-04-20T20:57:14+00:00","og_image":[{"width":2560,"height":1323,"url":"https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-scaled.png","type":"image\/png"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/how-to-implement-a-log-management-system\/#article","isPartOf":{"@id":"https:\/\/complior.se\/how-to-implement-a-log-management-system\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"How to implement a Log management system","datePublished":"2022-01-10T08:43:00+00:00","dateModified":"2026-04-20T20:57:14+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/how-to-implement-a-log-management-system\/"},"wordCount":930,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/how-to-implement-a-log-management-system\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-scaled.png","keywords":["Blog","Log management"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/how-to-implement-a-log-management-system\/","url":"https:\/\/complior.se\/how-to-implement-a-log-management-system\/","name":"How to implement a Log management system - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/how-to-implement-a-log-management-system\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/how-to-implement-a-log-management-system\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-scaled.png","datePublished":"2022-01-10T08:43:00+00:00","dateModified":"2026-04-20T20:57:14+00:00","description":"Implementation of a log management system is not easy due to lack of project objectives & the preparatory activities that are its foundation","breadcrumb":{"@id":"https:\/\/complior.se\/how-to-implement-a-log-management-system\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/how-to-implement-a-log-management-system\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/how-to-implement-a-log-management-system\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-scaled.png","width":2560,"height":1323,"caption":"3 people climbing pedestals"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/how-to-implement-a-log-management-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"How to implement a Log management system"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-scaled.png",2560,1323,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-150x150.png",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-300x155.png",300,155,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-768x397.png",768,397,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-1024x529.png",1024,529,true],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-1536x794.png",1536,794,true],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-2048x1058.png",2048,1058,true],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2022\/01\/how-to-implement-log-05-18x9.png",18,9,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"Implementation of a log management system is not easy due to lack of project objectives & the preparatory activities that are its foundation","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/3009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=3009"}],"version-history":[{"count":5,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/3009\/revisions"}],"predecessor-version":[{"id":80581,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/3009\/revisions\/80581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/51083"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=3009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=3009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=3009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}