Under active development Content is continuously updated and improved

8.5Collect Detailed Audit Logs

IG2
IG3
Data
Detect

>Control Description

Configure detailed audit logging for enterprise assets containing sensitive data. Include event source, date, username, timestamp, source addresses, destination addresses, and other useful elements that could assist in a forensic investigation.

>Cross-Framework Mappings

>Relevant Technologies

Technology-specific guidance with authoritative sources and verification commands.

Ask AI

Configure your API key to use AI features.