8.2: Collect Audit Logs
PF v1.0 References:
Threats Addressed:
Incorporates the following controls from the previous version: 6.2: Activate Audit Logging, 8.6: Centralize Anti-Malware Logging.
Control Statement
Collect audit logs. Ensure that logging, per the enterprise’s audit log management process, has been enabled across enterprise assets.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]