7.6: Log All URL requester

CSF v1.1 References:

Group:

Next Version:

Control Statement

Log all URL requests from each of the organization’s systems, whether on-site or a mobile device, in order to identify potentially malicious activity and assist incident handlers with identifying potentially compromised systems.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]