SecLog 

complete protection for your logs

SecLog is an ICT component specifically designed to meet regulatory requirements and security standards(*) that require logs to be stored in a secure and immutable format to ensure non-repudiation.

SecLog  offers a complete solution for corporate log protection, handling three crucial aspects: Secure Encryption: SecLog uses the AES256 algorithm to encrypt logs, thus ensuring that data is protected against unauthorised access. This strong encryption ensures that only authorised users can read the contents of the logs.

Notarisation on the Algorand blockchain: SecLog records logs on the Algorand blockchain, making them tamper evident: any attempt to alter the logs is immediately detected, ensuring the integrity and authenticity of the data.

Secure Storage: SecLog stores encrypted files in configured storage areas, ensuring that data is stored securely and accessible according to business needs.

SecLog is a versatile solution that can be implemented in various ICT infrastructure contexts. It is available as a virtual machine (VM), docker or physical appliance, allowing a choice to suit the specific needs of each business environment. Its advanced architecture facilitates the integration of logs from various machines within the ICT infrastructure without interfering with management services dedicated to exception monitoring and debugging. This ensures that SecLog can be adopted without compromising the efficiency and integrity of existing business log management processes.

Integration modes

SecLog uses standard components such as syslog-ng and logrotate to manage logs that must be secure and immutable. In the corporate ICT infrastructure, systems are configured to send logs to SecLog’s syslog-ng service. In addition, SecLog includes logrotate to define the granularity of notarisation down to the minute and to specify the storage location for encrypted files of notarised logs. The SecLog daemon manages the encryption keys, the compression of the logs, their encryption and transactions on the Algorand blockchain, ensuring that the logs are not repudiated.

(*) secure log management is essential for monitoring, detecting, responding to incidents, sharing information and demonstrating compliance with security regulations in current norms and standards; some reference norms: General Data Protection Regulation (GDPR), Network and Information Security Directive 2″ (NIS2), Information security, cybersecurity and privacy protection (ISO 27001)