ISM-0586

Event logs are protected from unauthorised access, modification and deletion.

Topic
Event log protection
Applicable to
all

History

Priority
must
Mar 2022
Removed
The approach to the management of event logs has been standardised to align with the Essential Eight Maturity Model. Furthermore, specific events to be logged, such as those related to databases, operating systems and web applications, have been moved to relevant guidelines.
2015
Event logs must be protected from modification and unauthorised access, and whole or partialloss within the defined retention period.
2010
Event logs must be protected from:• modification and unauthorised access• whole or partial loss within the defined retention period.
2008
Event logs must be: a. protected from modification and unauthorised access b. archived and retained for future access c. protected from whole or partial loss within the defined retention period.