8.5: Collect Detailed Audit Logs

CSF v1.1 References:

Threats Addressed:


Previous Version:

Control Statement

Configure detailed audit logging for enterprise assets containing sensitive data. Include event source, date, username, timestamp, source addresses, destination addresses, and other useful elements that could assist in a forensic investigation.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]