BİM.PR.24 — Logging and Monitoring Procedure
| Document No | BİM.PR.24 | Version | 1.0 | First Published | 26.04.2026 |
|---|---|---|---|---|---|
| Owner Group | Network & Security Group | ||||
| Approver | Mehmet ARARAT — IT Director | ||||
| Legal Basis | Law No. 5651 · KVKK Art.12 · ISO/IEC 27001:2022 A.8.15-8.16 · BİGDES | ||||
| Related Documents | KYS.POL.01 P15 (Change), P33 (Incident Breach), KYS.POL.05, BİM.PR.05, BİM.PR.10, BİM.PR.18 |
1. Purpose and Scope
Within the framework of KYS.POL.01 P33 (Incident Breach Notification) and KYS.POL.05 (Retention), defines the standards for collecting, protecting, retaining and reviewing audit records (logs) generated by institutional systems.
2. Logged Systems
portal.hku.edu.tr(authentication, password changes, 2FA events)- Google Workspace (send/receive, session, sharing)
- Firewall (inbound/outbound traffic summary, rule matches)
- VPN (session start/end, user, IP)
- Active Directory / SSO (login, failed attempts, privilege changes)
- OBS, EBYS, OYS (application access records)
- Web servers (HTTP access log)
- SAP Fixed Assets + inventory (authorisation changes)
- Databases (Sysadmin DML, audit trail)
3. Retention Period
Under KYS.POL.05 Art.8.1 retention table, category “Operational Security — 2 years”:
- All security logs: 2 years (compliant with Law No. 5651)
- Logs relevant to an ongoing incident are extended until the end of legal proceedings
- BIM Director manual mail access records (BİM.PR.18 Art.8): 5 years
4. Access
Logs are accessible only to the BIM Network & Security Group. Legal proceedings → court/prosecutor request + BIM Director approval + Legal Counsel notification. Log access requests are themselves logged (audit trail: “who, when, which log was accessed”).
5. Integrity
- Logs are stored on a WORM (Write-Once-Read-Many) repository
- Protected against tampering via hash chain
- Forwarded to a centralised SIEM; anomaly detection is automated
- Even authorised users cannot modify log server content
6. Anomaly Monitoring
- Sudden increase in failed 2FA attempts
- Simultaneous logins from different geographies on the same account
- Administrator actions outside working hours
- Privilege escalation attempt
- Bulk data download (DLP trigger)
Anomalies automatically alert the Help Desk and Network & Security Group; accounts may be temporarily suspended if necessary.
7. User Notice
KYS.POL.03 + Privacy Notice states “log retention 2 years”. Users may request access to their own log records under KVKK Art.11; the KVKK Commission responds within 30 days.
8. KVKK Compliance
Logs may contain personal data and are therefore subject to all KVKK principles. Upon expiry, automatic anonymisation or deletion is applied (BİM.PR.21 methods).
9. Effective Date
26.04.2026; revised January/July.
Hasan Kalyoncu University · IT Directorate
Osmanlı Mah. Havaalanı Yolu Üzeri 8. Km 27010 Şahinbey/Gaziantep
444 6 458 · destek@hku.edu.tr · destek.hku.edu.tr · portal.hku.edu.tr
KEP: hasankalyoncu.unv@hs01.kep.tr
