7.6: Log All URL requester
CSF v1.1 References:
Next Version:
- Critical Security Controls Version 8:
- 8.7: Collect URL Request Audit Logs
Control Statement
Log all URL requests from each of the organization’s systems, whether on-site or a mobile device, in order to identify potentially malicious activity and assist incident handlers with identifying potentially compromised systems.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]