FEA05-Log-Management-System 1.0
|
|
Feature ID |
FEA05 |
Subsystem the feature is part of |
Server |
Responsible person |
Aarne Salmi |
Status |
Under Review |
Description
We will make logging system to the server side. With logs we can scan for suspicious usage.
Name |
Description |
Use Case 1 |
Collect event from backend service as file format. Eg. Syslog of service |
Preliminary user stories
- #41 US110 As the administrator of the service, I want the logs to be in a machine-readable format so that various searches and parsing can be done on them
- [#68] US120 As a data protection officer, I want to know how I can find the actions taken by a selected person in the log
- #61 US125 As a service producer, I would like to save a week's worth of usage logs on a separate server, because those who break into the service are not allowed to destroy the logs
- #58 US127 As a service provider, I would like to collect a usage log related to the use of the service, based on which possible abuses can be determined
- #53 US128 As the administrator of the service, I hope that the format of the user log is visually interpretable, but it contains the attributes presented above
- #56 US130 User ID, time, performed function, possible status are saved in the usage log
- #54 US131 As a service administrator, I want to be able to search and visualize the collected usage log
- #50 US132 As a data protection officer, I would like to check, if necessary, the actions taken by an individual in the user log at a certain point in time (default 1h)
- #69 US140 As a service provider, I would like to save a week's worth of usage logs on a separate server, because those who break into the service are not allowed to destroy the logs
- #73 US142 As a service provider, I would like to collect a usage log related to the use of the service, on the basis of which possible abuses can be determined
- #76 US143 As the administrator of the service, I hope that the format of the user log is visually interpretable, but it contains the previously defined attributes
- #82 US145 User ID, time, performed function, possible status are saved in the usage log
- #85 US146 As a service administrator, I want to be able to search and visualize the collected usage log
- #83 US147 As a data protection officer, I would like to check, if necessary, the actions taken by an individual in the user log at a certain point in time (default 1h)
Testing / possible acceptance criteria
User Acceptance
- The log-management-system feature should meet the requirements and expectations of JAMK university personnel
- The log-management-system feature should be tested and validated by JAMK university personnel before being released