Xcavate Audit Trail Retention Matrix
Version: 1.0 Owner: Security Governance Team Review Frequency: Annually Classification: Internal – Confidential
Audit Log Type
Source System(s)
Data Captured
Retention Period
Storage Location
Review Frequency
Responsible Role
Justification / Notes
User Login/Logout Activity
Active Directory, Okta
Username, timestamp, device, location
6 years
Central SIEM (Azure Sentinel)
Monthly
IAM Administrator
FCA accountability and fraud investigation requirements
Privileged User Activity
PAM, AD, CloudTrail
Commands issued, config changes, access scope
6 years
Encrypted Archive Store
Weekly
Security Analyst
NIST AU-3, AU-6; high sensitivity risk
Financial Transactions Access Logs
ERP, Banking Apps
Transaction IDs, changes, values, approvals
7 years
Encrypted Vault (GRC)
Quarterly
Finance & Compliance Officer
FCA requirement for financial record traceability
Security Events (Incidents/Alerts)
SIEM, EDR, Firewall Logs
IPs, user ID, device IDs, alert types, remediation steps
6 years
Security Vault
Weekly
SOC Lead
Retain to demonstrate due diligence in incident response
System Configuration Changes
CMDB, DevOps Tooling
Before/after state, user ID, timestamp
3 years
DevSecOps Archive
Monthly
Change Manager
Supports RCA, patch failures, or integrity validation
Data Access Logs (PII & Confidential)
DLP, Database Audit Logs
File name, table accessed, user ID, operation performed
6 years
Secure Data Lake
Monthly
Data Protection Officer
GDPR & FCA compliance for sensitive data protection
Email & Messaging Logs
M365, Slack
Sender, receiver, subject, timestamp, message metadata
3 years
Archived Messaging Vault
Monthly
IT Operations
FCA misconduct monitoring and discovery support
IAM Recertification Logs
IGA/Access Review Tools
Reviewer, users reviewed, decisions made, timestamps
6 years
IAM Archive
Quarterly
IAM Governance Lead
Audit trail to support access control and recertification processes
Audit Log Integrity Check Records
Log Integrity Checker, SIEM
Hash values, timestamps, verification outcomes
3 years
Audit Control Repository
Monthly
Security Engineer
Supports NIST AU-9 for ensuring log integrity
Retention Policy Notes
Retention is based on the highest applicable regulation (FCA, NIST, GDPR).
Logs are encrypted at rest and in transit.
Immutable storage (e.g., WORM) used for critical categories (security, finance, IAM).
Annual purge cycles must be approved by compliance and data protection officer.
Last updated