ISM-1987

Event logs from security products are analysed in a timely manner to detect cybersecurity events.

Topic
Event log monitoring
Applicable to
Non Classified, Official, Protected, Secret, Top Secret

History

Mar 2025
Event logs from security products are analysed in a timely manner to detect cybersecurity events.
References to ‘cyber security’ were changed to ‘cybersecurity’ to align with Australia’s national dictionary.
Dec 2024
Event logs from security products are analysed in a timely manner to detect cyber security events.
A new control was added recommending that event logs from security products are analysed in a timely manner to detect cyber security events.