// Level 3 · Controls

Logging and Monitoring

LOG domain controls.

LOG-01Medium

Logging and Monitoring Policy and Procedures

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for logging and monitoring.

LOG-02Medium

Audit Logs Protection

Define, implement and evaluate processes, procedures and technical measures to ensure the security and retention of audit logs.

LOG-03Medium

Security Monitoring and Alerting

Identify and monitor security-related events within applications and the underlying infrastructure.

LOG-04High

Audit Logs Access and Accountability

Restrict audit logs access to authorized personnel and maintain records that provide unique access accountability.

LOG-05Medium

Audit Logs Monitoring and Response

Monitor security audit logs to detect activity outside of typical or expected patterns. Establish and follow a defined process to review and take appropriate and timely actions on detected anomalies.

LOG-06Medium

Clock Synchronization

Use a reliable time source across all relevant information processing systems.

LOG-07Medium

Logging Scope

Establish, document and implement which information meta/data system events should be logged.

LOG-08Medium

Log Records

Generate audit records containing relevant security information.

LOG-09Medium

Log Protection

The information system protects audit records from unauthorized access, modification, and deletion.

LOG-10High

Encryption Monitoring and Reporting

Establish and maintain a monitoring and internal reporting capability over the operations of cryptographic, encryption and key management policies, processes, procedures, and controls.

LOG-11Medium

Transaction/Activity Logging

Log and monitor key lifecycle management events to enable auditing and reporting on usage of cryptographic keys.

LOG-12High

Access Control Logs

Monitor and log physical access using an auditable access control system.

LOG-13Medium

Failures and Anomalies Reporting

Define, implement and evaluate processes, procedures and technical measures for the reporting of anomalies and failures of the monitoring system and provide immediate notification to the accountable party.