LOG-09: Log Protection

Control Family:

Logging and Monitoring

Threats Addressed:

Info icon.

Control is new to this version of the control set and incorporates the following controls from the previous version: GRM-04: Management Program, IVS-01: Audit Logging / Intrusion Detection.

Control Statement

The information system protects audit records from unauthorized access, modification, and deletion.

Implementation Guidance

Access to audit records should be granted based on a least-privilege basis and only to authorized individuals. Changes to logs, including deletions, should be tracked and approved by authorized individuals. Logs should be backed up per organizational policies.

Auditing Guidance

  1. Examine policy for the protection of audit records.
  2. Evaluate the use of technical measures in the protection of audit records.

[csf.tools Note: For more information on the Cloud Controls Matrix, visit the CSA Cloud Controls Matrix Homepage.]

Cloud Control Matrix is Copyright 2023 Cloud Security Alliance.