3.14: Log Sensitive Data Access
Threats Addressed:
Group:
Previous Version:
- Critical Security Controls Version 7.1:
- 14.9: Enforce Detail Logging for Access or Changes to Sensitive Data
Control Statement
Log sensitive data access, including modification and disposal.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]