The existing control relating to the centralised storage of unprivileged access event logs was merged into the existing control relating to collecting unprivileged access event logs. [ISM-1566, ISM-1714]
Dec 2021
Use of unprivileged access is logged.
The terminology used for logging and monitoring both unprivileged access and break glass access has been aligned with the terminology used for logging and monitoring privileged access within the Essential Eight Maturity Model.