Essential Cybersecurity Controls (ECC – 2 : 2024) 2-12-3 Requirement:
- The cybersecurity requirements for event logs and monitoring management must include at least the following:
- Activation of cybersecurity event logs on critical information assets.
- Activation of cybersecurity event logs on remote access and privileged user accounts.
- Identification of required technologies (e.g., SIEM) for cybersecurity event logs collection.
- Continuous monitoring of cybersecurity events
- Retention period for cybersecurity event logs (must be 12 months minimum).
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you