Essential Cybersecurity Controls (ECC – 2 : 2024) - 2-12-1
Cybersecurity Requirements For Event Logs And Monitoring Management Must Be Defined, Documented
And Approved.
Essential Cybersecurity Controls (ECC – 2 : 2024) - 2-12-2
The Cybersecurity Requirements For Event Logs And Monitoring Management Must Be Implemented.
Essential Cybersecurity Controls (ECC – 2 : 2024) - 2-12-3
- The cybersecurity requirements for event logs and monitoring management must include at least the following:
- Activation of cybersecurity event logs on critical information assets.
- Activation of cybersecurity event logs on remote access and privileged user accounts.
- Identification of required technologies (e.g., SIEM) for cybersecurity event logs collection.
- Continuous monitoring of cybersecurity events
- Retention period for cybersecurity event logs (must be 12 months minimum).
Essential Cybersecurity Controls (ECC – 2 : 2024) - 2-12-4
The Cybersecurity Requirements For Event Logs And Monitoring Management Must Be Reviewed
Periodically.