8.2: Collect Audit Logs

CSF v1.1 References:

PF v1.0 References:

Threats Addressed:

Group:

Info icon.

Incorporates the following controls from the previous version: 6.2: Activate Audit Logging, 8.6: Centralize Anti-Malware Logging.

Control Statement

Collect audit logs. Ensure that logging, per the enterprise’s audit log management process, has been enabled across enterprise assets.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]