Search


Enable Logging and Monitoring

(Back)

Objective

Continuously monitor system events and performance and include a security audit log function in all information systems to enable the detection of incidents. It is essential that an adequate level of logging and reporting including a security audit log function in all information systems hosted in the cloud environment and for cloud-based workloads.

Key Considerations

Logging

Monitoring

Additional Considerations

Validation

References

  1. Directive on Security Management - Appendix B: Mandatory Procedures for Information Technology Security Control, subsection B.2.3.8
  2. SPIN 2017-01, subsection 6.3, 6.3.1
  3. CSE Top 10 #1, 5, 8
  4. Refer to GC Event Logging Guidance
  5. Related security controls: AU‑2, AU‑3, AU‑6, AU‑8, AU‑9, AU‑9(4), AU‑12, SI-2, SI-4

Page details

Date modified: