The audit logs told a story no one had seen coming. One shell command, then another. A silent breach that bypassed every alert. The root cause: no separation of duties in Lnav usage.
Lnav is powerful. It gives direct, searchable access to log data, live or archived. For incident response, it’s a scalpel. For an unchecked user, it’s a crowbar into the heart of your systems. Without clear separation of duties, a single operator could both trigger an event and edit or hide the evidence before anyone notices.
Separation of duties in Lnav means breaking the chain of trust into defined, enforceable roles. One set of users can collect and store logs. Another can query and analyze them. A third can manage configuration and access control. No single person should hold all three capabilities. This reduces insider risk, limits damage from compromised accounts, and creates a provable audit trail.