ISM-1987

Event logs from security products are analysed in a timely manner to detect cyber security events.

Topic
Event log monitoring
Applicable to
Non Classified, Official, Protected, Secret, Top Secret

History

Dec 2024
Event logs from security products are analysed in a timely manner to detect cyber security events.
A new control was added recommending that event logs from security products are analysed in a timely manner to detect cyber security events.