Source |
The State of Security |
Identifiant |
8626975 |
Date de publication |
2024-12-18 03:21:44 (vue: 2024-12-18 10:07:53) |
Titre |
CIS Control 08: Audit Log Management |
Texte |
Audit logs provide a rich source of data critical to preventing, detecting, understanding, and minimizing the impact of network or data compromise in a timely manner. Collection logs and regular reviews are useful for identifying baselines, establishing operational trends, and detecting abnormalities. In some cases, logging may be the only evidence of a successful attack. CIS Control 8 emphasizes the need for centralized collection and storage and standardization to better coordinate audit log reviews. Some industries have regulatory bodies that require the collection, retention, and review of...
Audit logs provide a rich source of data critical to preventing, detecting, understanding, and minimizing the impact of network or data compromise in a timely manner. Collection logs and regular reviews are useful for identifying baselines, establishing operational trends, and detecting abnormalities. In some cases, logging may be the only evidence of a successful attack. CIS Control 8 emphasizes the need for centralized collection and storage and standardization to better coordinate audit log reviews. Some industries have regulatory bodies that require the collection, retention, and review of... |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
08: abnormalities are attack audit baselines better bodies cases centralized cis collection compromise control coordinate critical data detecting emphasizes establishing evidence have identifying impact industries log logging logs management manner may minimizing need network only operational preventing provide regular regulatory require retention review reviews rich some source standardization storage successful timely trends understanding useful |
Tags |
|
Stories |
|
Move |
|