Preview Your Audit
← All insights

Forging a New Security Frontier: Sentinel, Data Lakes, and Seven-Year Retention

Microsoft Sentinel's data lake architecture changes the economics of long-term security data retention — and POPIA's seven-year requirement finally becomes achievable.

Security teams across South Africa face the same impossible trade-off every budget cycle: maintain comprehensive visibility or control costs. The two objectives pull in opposite directions — and the logs that get cut first are precisely the ones you need six months later when an incident investigation demands historical correlation.

This is not a technology problem. It is an economics problem. And Microsoft Sentinel’s data lake architecture finally changes the equation.

Breaking the impossible trade-off

Historically, security teams faced a binary choice: maintain expensive archives of logs for future investigations, or optimise for daily operational detection and accept that historical data would age out. Most organisations chose the latter — not because they wanted to, but because the cost of retaining everything in a hot SIEM tier was indefensible to finance.

The Sentinel data lake separates storage from compute costs. Logs that do not need real-time alerting move to low-cost storage tiers while remaining queryable for investigation and compliance. This means an organisation can retain security data for seven years — the retention period POPIA demands for personal information processing records — without the per-GB ingestion costs that made long-term retention impossible.

No custom data architecture. No third-party archive solutions. No skilled engineering resources diverted from threat hunting to build and maintain storage pipelines.

A new era for threat hunting and compliance

The implications extend well beyond cost savings:

True long-term threat hunting. Advanced persistent threats operate on timescales measured in months, not minutes. With two years of correlated data instead of six weeks, threat hunters can identify patterns that were previously invisible — lateral movement campaigns, slow credential harvesting, and supply chain compromise indicators that only emerge over extended observation windows.

Compliance without compromise. POPIA, GDPR, and sector-specific regulations impose minimum retention periods that most SIEM deployments cannot meet at a reasonable cost. The data lake turns retention from a compliance burden into a policy configuration — set the period, assign the tier, and let the platform enforce the lifecycle.

Faster, deeper correlation. When an incident occurs, investigators need context from diverse data sources across an extended timeframe. The data lake enables rich contextual analysis that was previously limited by what the organisation could afford to keep online.

The platform integrates with Security Copilot, enabling AI-assisted investigation across months of historical data — surfacing connections that would take a human analyst days to find.

The local advantage

South Africa’s cybersecurity skills shortage is well documented. Every hour a skilled analyst spends managing storage infrastructure, building data pipelines, or manually archiving logs is an hour not spent on threat detection and incident response.

The data lake reduces architectural complexity. It eliminates the need to design, build, and maintain parallel storage systems. It lowers the barrier to entry for organisations that know they need long-term retention but lack the engineering capacity to implement it.

For a market where talent is scarce and expensive, simplification is not a luxury. It is a strategic necessity.

What Global Micro Solutions brings

Our Sentinel practice has deployed and optimised data lake architectures for organisations across EMEA. We bring three capabilities to the table:

Deployment strategy — seamless evolution of existing Sentinel implementations, migrating historical data to appropriate storage tiers without disrupting active detection rules or alert workflows.

Cost optimisation — intelligent data classification that routes high-value logs to hot tiers and compliance data to low-cost storage, with quarterly reviews to ensure the balance remains optimal as your environment evolves.

Enhanced MDR — our managed detection and response service leverages multi-year visibility for deeper threat intelligence, correlating current alerts against historical baselines that most SOCs simply do not have.

The question for your next budget cycle

If your current SIEM retains 90 days of data and your regulator expects seven years, the gap is not a technical debt item you can defer indefinitely. It is a compliance risk that compounds with every month of data you discard.

The economics have changed. The architecture exists. The question is whether your organisation will act before the next incident forces the decision.


Claudia Correia de Araujo is a security architect at Global Micro Solutions, specialising in Microsoft Sentinel, Defender XDR, and AI governance across regulated environments.

C
Claudia Correia de Araujo

Microsoft MVP and founder of Global Micro Solutions. 30+ years securing Microsoft environments across 1,200+ tenants. Writes about rethinking compliance from first principles.

See what the auditor would find. In 30 minutes.

Same questions a real ISO 27001 auditor asks. Immediate gap analysis.

Start Your Audit Preview