8.8: Collect Command-Line Audit Logs

CSF v1.1 References:

PF v1.0 References:

Threats Addressed:

Group:

Previous Version:

Control Statement

Collect command-line audit logs. Example implementations include collecting audit logs from PowerShell®, BASH™, and remote administrative terminals.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]