Logging strategies for security incident response