Blackfort Technology
Blackfort Log Vault
Blackfort Product

Tamper-Evident Log Retention

Blackfort Log Vault

Logs are stored immutably, cryptographically protected – and managed independently of your existing IT administration. For compliance evidence, forensic analysis and regulatory requirements.

The structural problem with conventional logging

Logs are the single most important tool for reconstructing security incidents. In most environments, however, they end up in systems to which the very administrators whose activities are being logged also have access. An attacker with administrator rights – or an insider – can modify, delete or selectively suppress logs.

This is not a fringe problem: in forensic investigations following serious security incidents the relevant logs are missing in roughly one third of cases – modified, deleted or simply never stored immutably in the first place.

The Blackfort Log Vault resolves this structural problem through a clean separation: the vault instance runs with its own administration rights, separated from production IT administration. No system administrator has write access to stored logs.

Importantly, the Log Vault is not an end point but a foundation. Tamper-evident logs are the prerequisite for reliable SIEM correlation, sound forensic analysis and audit-grade compliance evidence. Anything not archived with integrity cannot stand up either as a basis for detection or in front of auditors.

What the Log Vault delivers

Cryptographic immutability

Every stored log entry is cryptographically signed. Any subsequent change is detectable – irrespective of who makes it.

Independent administration

The Log Vault runs as a standalone instance with separate administration rights. System administrators have no write access to the vault instance.

Broad source support

Syslog (RFC 5424), Windows Event Logs, Azure Monitor, AWS CloudTrail, GCP Cloud Logging and application logs via REST API are collected centrally.

Compliance reports on demand

Pre-built audit reports for NIS2, ISO 27001, DORA and BSI IT-Grundschutz. Audit-grade evidence without manual collation.

Regulatory requirements

Tamper-evident log retention is explicitly required across all relevant compliance frameworks. In practice it turns out that auditors – whether under ISO 27001, in DORA reviews by BaFin-appointed auditors, or during NIS2 reviews – ask not only whether logs exist but whether their integrity is demonstrable. The Log Vault addresses precisely those requirements:

StandardReferenceRequirement
NIS2Art. 21(2)Recording and documentation of security-relevant events, retention of at least 12 months
ISO 27001Annex A.8.15Logging: protection of log information against tampering and unauthorised access
DORAArt. 12ICT logging for financial entities: completeness, integrity and confidentiality of logs
BSI IT-GrundschutzOPS.1.1.5Logging: audit-grade retention and protection against tampering

Use cases

Forensics after a security incident

An attacker has modified system logs to cover their tracks. In the Log Vault all events remain unchanged – cryptographically protected and immune to administrator interference. Forensic analysis remains possible.

ISO 27001 / DORA audit

The auditor – whether an auditor performing a DORA review or an ISO 27001 certification body – requests audit-grade evidence for all privileged accesses of the past 12 months. The Log Vault delivers this report in a structured, complete and demonstrably unaltered form – in minutes rather than days.

NIS2: separation of administration and logging

NIS2 requires that administrators cannot quietly obscure their own activities. The Log Vault solves this structural requirement through a consistent separation of system administration and audit function.

Full product page

Blackfort Independent Log Vault

Technical details, deployment options and the full specification.

Go to product page

Log Vault at a glance

OperationOn-premises / private cloud
SourcesSyslog, WEF, Azure, AWS, GCP, REST
RetentionConfigurable, min. 12 months
ProtectionCryptographic signature
ReportsNIS2, ISO 27001, DORA, BSI
Admin separationFully separated

Use cases

  • Compliance evidence for audits
  • Forensics after security incidents
  • Protection against insider threats
  • NIS2 & DORA logging obligations
  • Separation of administration and audit

Request product

Talk to us about deployment, integration and licensing.

Request now

Frequently asked questions about the Log Vault

What is the difference between a Log Vault and a SIEM?

A SIEM analyses logs in real time and generates alerts. A Log Vault archives logs in a tamper-evident way for compliance and forensic readiness. The two are not mutually exclusive – the Blackfort Log Vault complements your SIEM with an independent, audit-ready archive layer.

Which log sources are supported?

Syslog (RFC 5424), Windows Event Log via WEF, Azure Monitor, AWS CloudTrail, GCP Cloud Logging and application logs via REST API.

Can the Log Vault run on-premises?

Yes. The Log Vault is designed for on-premises operation and also supports private cloud deployments. No external data transfer takes place.

How long are logs retained?

The retention period is configurable. NIS2 mandates at least 12 months; for certain sectors and scenarios up to 10 years apply.

Does the Log Vault replace the existing logging system?

No. The Log Vault is an independent archive instance operated in parallel with existing systems. It does not replace a SIEM, a monitoring system or an existing log shipper – it secures their output in a tamper-evident way.

Kontakt aufnehmen

Bereit für den nächsten Schritt?

Sprechen Sie mit uns über Ihre Sicherheitsanforderungen – konkret, ohne Verpflichtung und auf Augenhöhe.