Bramble Audit Logging Policy


To ensure the proper operation and security of, Bramble logs critical information system activity.


The audit logging policy applies to all systems within our production environment. The production environment includes all endpoints and cloud assets used in hosting and its subdomains. This may include third-party systems that support the business of

Roles & Responsibilities:

Role Responsibility
Security Team Policy definition and oversight
System Owners Definition of individual audit log criteria; Definition and execution of system audit log procedures


  • Bramble shall log and monitor critical information system activity.
  • Logs must be retained for a defined period of time.
  • Logs must not be modified and or deleted.
  • Access to audit log data must be limited based on the principle of least privilege.

Inline with the OWASP Logging Guidance, System Owners are responsible for determining what constitutes “critical information system activity” in their respective system based on their experience and professional judgement; such activity is then documented either in the handbook or a runbook, whichever is found to be appropriate. Audit logging process must created and implemented by the department(s) or team(s) responsible for a given system.


Exceptions to this policy will be tracked as per the Information Security Policy Exception Management Process.