14.9: Enforce Detail Logging for Access or Changes to Sensitive Data

CSF v1.1 References:

PF v1.0 References:


Next Version:

Control Statement

Enforce detailed audit logging for access to sensitive data or changes to sensitive data (utilizing tools such as File Integrity Monitoring or Security Information and Event Monitoring).

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]