R36 — Log Retention / Audit-Trail Failure
Insufficient retention, gaps in critical event coverage, or tampered logs leave incidents un-investigable and audits failable. Detection (centralized logging, integrity monitoring) plus prevention (write-once storage, retention policy) are the dominant controls. Residual remains because logs are only as good as what the source emits, and many SaaS apps emit very little by default.
What is Log Retention / Audit-Trail Failure?
Insufficient retention, gaps in critical event coverage, or tampered logs leave incidents un-investigable and audits failable. Detection (centralized logging, integrity monitoring) plus prevention (write-once storage, retention policy) are the dominant controls. Residual remains because logs are only as good as what the source emits, and many SaaS apps emit very little by default. CISO Game tracks this as R36 in the live risk register, severity 7 (Major), category Governance.
How does CISO Game model Log Retention / Audit-Trail Failure?
Exposure for R36 runs from 0 to 100, recomputed live as you buy, cancel, or reassign products. How the exposure model works →
Real-world parallel
Log retention / audit-trail failure is the risk that you detect an incident but can't reconstruct it. Common in cost-pressured environments where SIEM ingest budgets get cut and detection-engineering coverage shrinks. Real consequences land when regulators or insurers ask for the logs. Worst-case discovery: the incident happened months ago and the relevant logs aged out.
How do security teams mitigate Log Retention / Audit-Trail Failure?
The dominant subscore levers for this risk are:
- Detection subscore — weight 40%
- Prevention subscore — weight 20%
- Response subscore — weight 15%
- Recovery subscore — weight 5%
Residual offset: +10 exposure points are structural — no product fully removes them. Real-world parallels: zero-day windows, vendor monoculture, regulator unpredictability.
Which investments mitigate Log Retention / Audit-Trail Failure?
Products in CISO Game that reduce exposure to R36:
- Open-Source SIEM (self-hosted)SIEM
- Commercial SIEM (mid-market)SIEM
- Enterprise SIEM (heavy/full-featured)SIEM
- Full IAM with PAMIAM
- Hire Detection EngineerHeadcount
- MSSP — managed 24/7Services
- SOC 2 Type IICompliance
- ISO 27001Compliance
Which related risks should you also watch?
Risks with similar dominant subscores or shared category — addressing one often helps the others:
- R18 Audit FailureGovernance · severity 6
- R49 Nth-Party Concentration RiskGovernance · severity 7
- R09 Insider ThreatInsider · severity 8
- R11 Lateral MovementInsider · severity 8
Why does Log Retention / Audit-Trail Failure matter to a CISO?
Governance risk is the structural risk that lives in audits, attestations, and board reporting. Log Retention / Audit-Trail Failure is the kind of risk that lands a CISO in front of a regulator regardless of how well their controls actually work.
How can you test your mitigation strategy?
Click Play CISO Game free to see R36 appear live in your risk register and watch each purchase move the exposure number in real time. No signup required.
Stress-test Log Retention / Audit-Trail Failure in the Fintech IPO crunch scenario →