An access log is a log file that tracks when one or more things were accessed.
Access logs are an essential part of security and analytics in computing.
Access logs are also an important security and safety tool in the physical world.
An access log tracks the date and time that something is accessed or attempted to be accessed.
Generally by whom, as well as that is known.
Access logs often include secondary information as well.
This secondary information can provide context or further analytically useful data.
Or file and may be pretty straightforward.
In some cases, the access log may even track any changes made.
This typically would be logged separately.
Access being denied is a state that should be logged.
This provides direct insight into when someone is attempting to gain access to something they shouldnt.
Of course, there are potentially legitimate reasons for this.
Perhaps the user made a typo in their password.
Or maybe the user hasnt been given the access they should have been.
The alternative is that an unauthorized user is trying to gain access.
It could also be a legitimate user account trying to access a file they dont have permission to.
Tracking when access is successful is also useful.
Access itself may not be an issue, but actions after that might be.
Simply logging the username may not be enough for this use case.
This could be determined because the source IP addresses would or would not match historically logged data.
Access Logs and Analytics
Access logs for public data can switch on the analysis of general trends.
It may then be helpful to know when these patterns are broken as that might indicate a security incident.
Access Logs and Physical Security
Many companies practice physical security at their offices and data centers.
Access logging here may be low-tech, such as using a sign-in book.
High-tech options such as RFID door cards may also be used.
Physical access logging is an excellent first line of physical defense.
Access cards essentially lock all or a good number of doors.
This makes it much harder for hackers or thieves to reliably move around the building.
Of course, there are many ways to counter these physical security measures.
Even with no other measures in place, they can be a reasonable deterrent.
Would-be thieves and hackers need to be much more informed before trying anything.
They would rely on social engineering skills and at least some luck.
Access logs can be both a blessing and a curse in some scenarios like this.
Digital systems are even more prone to a somewhat related issue.
Furthermore, digital systems typically report to internal computers.
Additionally, other human factors can scupper the best-laid plans.
In the case of a fire, everyone is supposed to go to the emergency meeting point.
Some people, however, may take a different exit and wait in the wrong place.
Others may take the opportunity to nip away for a smoke or go to the shops.
Logs provide help to provide security tracking and, with the right data points, can enable useful analytics.