🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure SIEM, Alerts, and Retention to Satisfy ECC Logging Requirements: Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-12-1

Learn step-by-step how to configure SIEM collection, alerts, and retention to meet ECC 2-12-1 logging requirements with practical examples for small businesses.

March 26, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Meeting ECC 2-12-1 means more than turning on a few logs — it requires a structured SIEM architecture, tuned detection and alerting, and defensible retention policies so that investigators, auditors, and incident responders can reliably find evidence when it matters.

Map ECC 2-12-1 to concrete logging objectives

Start by translating ECC 2-12-1 into measurable objectives: (1) centrally collect security-relevant logs from all in-scope systems, cloud services and network devices; (2) protect log integrity and access; (3) retain logs for a risk-based, documented period and be able to search/restore them; and (4) generate timely, meaningful alerts that drive incident response. For a Compliance Framework implementation, document this mapping in your control matrix and associate each objective with owners, metrics (e.g., percent of hosts forwarding logs), and acceptance criteria for audits.

Inventory sources and define the data schema

Inventory every log source: endpoints (Windows Event, Sysmon, OS logs), servers (syslog, application logs), firewalls, VPNs, identity services (Azure AD, Okta), cloud audit trails (CloudTrail, Azure Activity Log), and SaaS providers (Gmail/Workspace, Office 365). Define a minimal schema to collect for each event: timestamp, host, user, event_id/type, source_ip, dest_ip/port, process/path, file_hash, outcome (success/fail), and raw_message. This structured approach ensures you can reliably search for authentication anomalies, lateral movement, and data exfiltration during investigations.

SIEM collection, parsing, and retention mechanics

Choose collection mechanisms appropriate to the environment: Winlogbeat/Windows Event Forwarding for Windows, Filebeat/Fluentd for Linux and containers, rsyslog/syslog-ng for network devices, and native cloud connectors (Azure Diagnostic settings to Log Analytics, CloudTrail to an S3 bucket + subscription). In the SIEM, normalize fields and enrich events with asset owner, business criticality and network zone. For retention, implement index lifecycle and archival: Elasticsearch ILM (hot → warm → cold; rollover by size/time) or Splunk index settings (frozenTimePeriodInSecs to set searchable retention, then archive to S3). Ensure logs at rest are encrypted (KMS) and apply integrity controls — use object lock/WORM on S3-compatible storage or sign log bundles with HMAC to prove tamper-evidence.

Retention examples and storage planning

ECC 2-12-1 expects documented retention — for many small businesses a defensible, risk-based default is: security event logs (authentication, endpoint alerts, network flow) retained searchable for 365 days; audit trails for critical systems retained 3 years if regulated; long-term cold archives (Glacier or equivalent) retained per legal requirements. Estimate storage with a simple formula: (events/day) × (avg bytes/event) × retention_days. For example, 50 hosts × 2,000 events/day × 1,000 bytes/event × 365 days ≈ 36 TB/year; consider compression and parsed vs. raw storage when planning costs.

Design alerts: rules, tuning, and workflow integration

Design alerts around high-value detection use cases — credential stuffing, suspicious privilege escalations, service-to-service token misuse, unusual data transfer volumes, and new/unknown process launches on critical hosts. Use these practices: map each rule to a MITRE ATT&CK technique and ECC control objective, set severity labels (P1–P4) tied to SLA for response, implement alert suppression windows for noisy-but-benign events, and tune thresholds using a 30–60 day baseline. Ensure alerts create tickets in your incident tracking system with context (enriched fields and a link to raw events) and a short runbook for next steps to accelerate triage.

Small business scenarios (practical examples)

Example A — Cloud-first small business (30 employees): Enable Azure Diagnostic settings for Azure AD and virtual machines to send logs to a Log Analytics workspace, set retention to 365 days for the workspace, and export to an encrypted storage account for long-term retention (object lock enabled). Configure Sentinel analytic rules for risky sign-ins and data exfil patterns; map high-severity alerts to a PagerDuty escalation. Example B — On-prem & hybrid (50 employees): Deploy Wazuh agents on endpoints, forward logs to a Graylog/Elastic cluster. Configure Filebeat → Logstash → Elasticsearch with an ILM policy that rolls indices monthly and moves older indices to a cold node or S3 snapshot, preserving one year searchable and archiving 3 years to S3 Glacier. For both, document owner, retention justification, and a restoration test schedule.

Operationalize compliance and mitigate risk of non-implementation

Operationalize by codifying logging policy and runbooks, scheduling quarterly reviews of retention and alert effectiveness, and proving evidence: export retention policies, SIEM index settings, sample forensic searches, and alert/incident history for auditors. The risk of not implementing ECC 2-12-1 is concrete: inability to detect and investigate breaches, missed notification timelines, regulatory penalties, and reputational damage. From an operational view, missing logs can mean missed root cause, longer downtime, and unchecked attacker dwell time.

In summary, to satisfy ECC 2-12-1 you must inventory and normalize all in-scope logs, implement secure centralized collection, define and enforce retention with archive/integrity controls, and build tuned alerts mapped to incident response. For small businesses this can be achieved using managed cloud SIEMs or open-source stacks with clear retention policies, tuning schedules, and documented evidence — ensuring the organization can reliably detect, investigate, and prove compliance when required.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes