14.9: Enforce Detail Logging for Access or Changes to Sensitive Data
CSF v1.1 References:
PF v1.0 References:
Group:
Next Version:
- Critical Security Controls Version 8:
- 3.14: Log Sensitive Data Access
Control Statement
Enforce detailed audit logging for access to sensitive data or changes to sensitive data (utilizing tools such as File Integrity Monitoring or Security Information and Event Monitoring).
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]