<section title="16.6. Event Monitoring, Logging and Auditing"><subsection title="Objective"><paragraph
    title="16.6.1."


><![CDATA[<p><span class="TextRun SCXW207310985 BCX8"><span class="NormalTextRun SCXW207310985 BCX8">Information security related events are </span><span class="NormalTextRun SCXW207310985 BCX8">logged</span></span><span class="TextRun SCXW207310985 BCX8"><span class="NormalTextRun SCXW207310985 BCX8">, </span></span><span class="TextRun Highlight SCXW207310985 BCX8"><span class="NormalTextRun SCXW207310985 BCX8">monitored</span></span> <span class="TextRun SCXW207310985 BCX8"><span class="NormalTextRun SCXW207310985 BCX8">and</span><span class="NormalTextRun SCXW207310985 BCX8"> audited for accountability, incident management, forensic and system </span><span class="NormalTextRun SCXW207310985 BCX8">monitoring</span><span class="NormalTextRun SCXW207310985 BCX8"> purposes.</span></span></p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.6.2."


><![CDATA[<p>This section covers information on the automatic logging of information relating to network activities. &nbsp;Information regarding manual logging of system management activities can be found in <a title="Privileged user access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15503">Section 16.3 - Privileged User Access</a>. &nbsp;See also <a title="Information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter7 - Information Security Incidents</a>.</p>]]></paragraph>
<paragraph
    title="16.6.3."


><![CDATA[<p>A security event is a change to normal or expected behaviour of a network, network component, system, device or user.  Event logging helps improve the security posture of a system by increasing the accountability of all user actions, thereby improving the chances that malicious behaviour will be detected.</p>]]></paragraph>
<paragraph
    title="16.6.4."


><![CDATA[<p>It is important that sufficient details are recorded in order for the logs to be useful when reviewed or when an investigation is in progress.  Retention periods are also important to ensure sufficient log history is available.  Conducting audits of event logs is an integral part of the security and maintenance of systems, since they will help detect and attribute any violations of information security policy, including cyber security incidents, breaches and intrusions.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="16.6.5."


><![CDATA[<p>Additional information relating to event logging is contained in:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p class="no-uppercase"><strong><span class="TextRun SCXW152791976 BCX8"><span class="NormalTextRun SCXW152791976 BCX8">ISO/IEC 27001</span></span></strong></p>
</td>
<td style="text-align: center;">
<p><span class="TextRun SCXW113598929 BCX8"><span class="NormalTextRun SCXW113598929 BCX8">ISO</span><span class="NormalTextRun SCXW113598929 BCX8">/</span><span class="NormalTextRun SCXW113598929 BCX8">IEC</span><span class="NormalTextRun SCXW113598929 BCX8">/ </span><span class="NormalTextRun SCXW113598929 BCX8">Standards NZ</span></span><span class="EOP SCXW113598929 BCX8">&nbsp;</span></p>
</td>
<td>
<p><a class="Hyperlink SCXW253474471 BCX8" rel="noopener noreferrer" href="https://www.standards.govt.nz/shop/ISOIEC-270012022" target="_blank"><span class="TextRun Underlined SCXW253474471 BCX8"><span class="NormalTextRun SCXW253474471 BCX8">Standards New Zealand</span></span></a><span class="EOP SCXW253474471 BCX8">&nbsp;</span></p>
</td>
</tr>
<tr>
<td>
<p><strong>Standard Time for a New Zealand Network</strong></p>
</td>
<td style="text-align: center;">
<p>Measurement Standards Laboratory</p>
</td>
<td><a class="Hyperlink SCXW95605750 BCX8" rel="noopener noreferrer" href="https://www.measurement.govt.nz/about-us/official-new-zealand-time/about-time" target="_blank"><span class="TextRun Underlined SCXW95605750 BCX8"><span class="NormalTextRun SCXW95605750 BCX8">MSL NTP Server | Measurement Standards Laboratory</span></span></a><span class="EOP SCXW95605750 BCX8">&nbsp;</span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Maintaining system management logs"><paragraph
    title="16.6.6.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>Having comprehensive information on the operations of a system can assist system administration, support information security and assist incident investigation and management.  In some cases forensic investigations will rely on the integrity, continuity and coverage of system logs.</p>]]></paragraph>
<paragraph
    title="16.6.6.R.02."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>It will be impractical and costly to store all system logs indefinitely. An agency retention policy may consider:</p><ul>
<li>Legislative and regulatory requirements;</li>
<li>Ensure adequate retention for operational support and efficiency; </li>
<li>Minimise costs and storage requirements; and</li>
<li>An adequate historical archive is maintained.</li>
</ul><p>Care should be taken to ensure that these considerations are properly balanced.<br>Some practices dictate retention periods, for example good DNSSEC practice requires log information is stored in log servers for 4 months, then archived and retained for at least 2 years.</p>]]></paragraph>
<paragraph
    title="16.6.6.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="Top Secret"
    compliance="Must"
    cid="1997"
><![CDATA[<p>Agencies MUST maintain system management logs for the life of a system.</p>]]></paragraph>
<paragraph
    title="16.6.6.C.02."

    tags="Governance,Information Security Documentation,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="1998"
><![CDATA[<p>Agencies SHOULD determine a policy for the retention of system management logs.</p>]]></paragraph>
</block>
<block title="Content of system management logs"><paragraph
    title="16.6.7.R.01."

    tags="Governance,Access Control,Key Management,Passwords,Event Logging"


><![CDATA[<p>Comprehensive system management logs will assist in logging key management activities conducted on systems.</p>]]></paragraph>
<paragraph
    title="16.6.7.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2001"
><![CDATA[<p>A system management log SHOULD record the following minimum information:</p>
<ul>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">all&nbsp;</span><span class="NormalTextRun SCXW70528927 BCX8">system start</span><span class="NormalTextRun SCXW70528927 BCX8">-</span><span class="NormalTextRun SCXW70528927 BCX8">up and </span><span class="NormalTextRun SCXW70528927 BCX8">shutdown</span><span class="NormalTextRun SCXW70528927 BCX8">;</span></span></li>
<li><span class="TextRun Highlight SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">all system </span><span class="NormalTextRun SCXW70528927 BCX8">changes</span></span><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">;</span></span></li>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">user&nbsp;</span><span class="NormalTextRun SCXW70528927 BCX8">changes;</span></span></li>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">service, application,&nbsp;</span><span class="NormalTextRun SCXW70528927 BCX8">component</span><span class="NormalTextRun SCXW70528927 BCX8"> or system </span><span class="NormalTextRun SCXW70528927 BCX8">failures;</span></span></li>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">maintenance&nbsp;</span><span class="NormalTextRun SCXW70528927 BCX8">activities;</span></span></li>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">backup and archival&nbsp;</span><span class="NormalTextRun SCXW70528927 BCX8">activities;</span></span></li>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">system recovery activities; and</span></span></li>
<li><span class="TextRun SCXW70528927 BCX8"><span class="NormalTextRun SCXW70528927 BCX8">special or out of hours activities.</span></span><span class="LineBreakBlob BlobObject DragDrop SCXW70528927 BCX8"><span class="SCXW70528927 BCX8">&nbsp;</span><br class="SCXW70528927 BCX8"></span></li>
</ul>]]></paragraph>
</block>
<block title="Logging requirements"><paragraph
    title="16.6.8.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p><span class="TextRun SCXW41788053 BCX8"><span class="NormalTextRun SCXW41788053 BCX8">Event logging</span> </span><span class="TextRun Highlight SCXW41788053 BCX8"><span class="NormalTextRun SCXW41788053 BCX8">and monitoring</span></span><span class="TextRun SCXW41788053 BCX8"><span class="NormalTextRun SCXW41788053 BCX8"> can help raise the security posture of a system by increasing the accountability for all system user actions.</span></span></p>]]></paragraph>
<paragraph
    title="16.6.8.R.02."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p><span class="TextRun SCXW148229708 BCX8"><span class="NormalTextRun SCXW148229708 BCX8">Event logging</span> </span><span class="TextRun Highlight SCXW148229708 BCX8"><span class="NormalTextRun SCXW148229708 BCX8">and monitoring</span></span><span class="TextRun SCXW148229708 BCX8"><span class="NormalTextRun SCXW148229708 BCX8"> can increase the chances that malicious behaviour will be detected by logging the actions of a malicious party.</span></span></p>]]></paragraph>
<paragraph
    title="16.6.8.R.03."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>Well configured event logging allows for easier and more effective auditing and forensic examination if an information security incident occurs.</p>]]></paragraph>
<paragraph
    title="16.6.8.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="2006"
><![CDATA[<p>Agencies MUST develop and document logging requirements covering:</p><ul>
<li>the logging facility, including:
<ul>
<li>log server availability requirements; and</li>
<li>the reliable delivery of log information to the log server;</li>
</ul>
</li>
<li>the list of events associated with a system or software component to be logged; and</li>
<li>event log protection and archival requirements.</li>
</ul>]]></paragraph>
</block>
<block title="Events to be logged"><paragraph
    title="16.6.9.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>The events to be logged are key elements in the monitoring of the security posture of systems and contributing to reviews, audits, investigations and incident management.</p>]]></paragraph>
<paragraph
    title="16.6.9.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2009"
><![CDATA[<div class="SCXW11263710 BCX8">
<div class="OutlineElement Ltr SCXW11263710 BCX8">
<p class="Paragraph SCXW11263710 BCX8"><span class="TextRun SCXW11263710 BCX8"><span class="NormalTextRun SCXW11263710 BCX8">Agencies</span> <span class="NormalTextRun SCXW11263710 BCX8">MUST</span><span class="NormalTextRun SCXW11263710 BCX8"> log, at minimum, the following events for all software components:</span></span><span class="EOP SCXW11263710 BCX8">&nbsp;</span></p>
</div>
<div class="ListContainerWrapper SCXW11263710 BCX8">
<ul>
<li><span class="TextRun Highlight SCXW11263710 BCX8"><span class="NormalTextRun SCXW11263710 BCX8">a</span><span class="NormalTextRun SCXW11263710 BCX8">ny login activity or </span><span class="NormalTextRun SCXW11263710 BCX8">attempts</span></span><span class="TextRun SCXW11263710 BCX8"><span class="NormalTextRun SCXW11263710 BCX8">;</span></span><span class="EOP SCXW11263710 BCX8">&nbsp;</span></li>
<li><span class="TextRun SCXW11263710 BCX8"><span class="NormalTextRun SCXW11263710 BCX8">date and&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">time;</span></span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">all privileged&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">operations</span><span class="NormalTextRun SCXW11263710 BCX8">;</span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">failed attempts to elevate&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">privileges;</span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">security related system alerts and&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">failures;</span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">software upgrades and/or software&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">patching</span><span class="NormalTextRun SCXW11263710 BCX8">;</span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">system recovery&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">activities;</span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">system user and group additions,&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">deletions</span><span class="NormalTextRun SCXW11263710 BCX8"> and modification to permissions; and</span><span class="EOP SCXW11263710 BCX8">&nbsp;</span></li>
<li><span class="NormalTextRun SCXW11263710 BCX8">unauthorised or failed access attempts to systems and files identified as critical to the&nbsp;</span><span class="NormalTextRun SCXW11263710 BCX8">organisation</span><span class="NormalTextRun SCXW11263710 BCX8">.</span></li>
</ul>
</div>
</div>]]></paragraph>
</block>
<block title="Additional events to be logged"><paragraph
    title="16.6.10.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>The additional events to be logged can be useful for reviewing, auditing or investigating software components of systems.</p>]]></paragraph>
<paragraph
    title="16.6.10.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2012"
><![CDATA[<p>Agencies SHOULD log the events listed in the table below for specific software components.</p><table class="table-control">
<tbody>
<tr>
<td>Software component</td>
<td>Events to log</td>
</tr>
<tr>
<td>Database</td>
<td>
<p>System user access to the database.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Attempted access that is denied.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Changes to system user roles or database rights.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Addition of new system users, especially privileged users.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Modifications to the data.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Modifications to the format or structure of the database.</p>
</td>
</tr>
<tr>
<td>Network/operating system</td>
<td>
<p>Successful and failed attempts to logon and logoff.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Changes to system administrator and system user accounts.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Failed attempts to access data and system resources.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Attempts to use special privileges.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Use of special privileges.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>System user or group management.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Changes to the security policy.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Service failures and restarts.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>System startup and shutdown.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Changes to system configuration data.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Access to sensitive data and processes.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Data import/export operations.</td>
</tr>
<tr>
<td>
<p>Web application</p>
</td>
<td>
<p>System user access to the Web application.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Attempted access that is denied.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>System user access to the Web documents.</p>
</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>
<p>Search engine queries initiated by system users.</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="16.6.10.C.02."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2013"
><![CDATA[<div class="OutlineElement Ltr SCXW80200118 BCX8">
<p class="Paragraph SCXW80200118 BCX8"><span class="TextRun SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">Agencies</span> <span class="NormalTextRun SCXW80200118 BCX8">SHOULD </span><span class="NormalTextRun SCXW80200118 BCX8">log, at minimum, the following events for all software components:</span></span><span class="EOP SCXW80200118 BCX8">&nbsp;</span></p>
</div>
<div class="ListContainerWrapper SCXW80200118 BCX8">
<ul>
<li class="Paragraph SCXW80200118 BCX8"><span class="TextRun Highlight SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">Any login activity or </span><span class="NormalTextRun SCXW80200118 BCX8">attempts</span></span><span class="TextRun SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">;</span></span><span class="EOP SCXW80200118 BCX8">&nbsp;</span><span class="TextRun SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">all privileged </span><span class="NormalTextRun SCXW80200118 BCX8">operations</span><span class="NormalTextRun SCXW80200118 BCX8">;</span></span></li>
<li class="Paragraph SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">failed attempts to elevate&nbsp;</span><span class="NormalTextRun SCXW80200118 BCX8">privileges</span><span class="NormalTextRun SCXW80200118 BCX8">;</span><span class="EOP SCXW80200118 BCX8">&nbsp;</span></li>
<li class="Paragraph SCXW80200118 BCX8"><span class="TextRun SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">security related system alerts and&nbsp;</span><span class="NormalTextRun SCXW80200118 BCX8">failures</span><span class="NormalTextRun SCXW80200118 BCX8">;</span></span><span class="EOP SCXW80200118 BCX8">&nbsp;</span></li>
<li class="Paragraph SCXW80200118 BCX8"><span class="TextRun Highlight SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">all software</span><span class="NormalTextRun SCXW80200118 BCX8"> updates and/or patching;</span></span></li>
<li class="Paragraph SCXW80200118 BCX8"><span class="TextRun SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">system user and group additions,&nbsp;</span><span class="NormalTextRun SCXW80200118 BCX8">deletions</span><span class="NormalTextRun SCXW80200118 BCX8"> and modification to permissions; and</span></span><span class="EOP SCXW80200118 BCX8">&nbsp;</span></li>
<li class="Paragraph SCXW80200118 BCX8"><span class="NormalTextRun SCXW80200118 BCX8">unauthorised&nbsp;</span><span class="NormalTextRun SCXW80200118 BCX8">or failed </span><span class="NormalTextRun SCXW80200118 BCX8">access attempts to systems and files identified as critical to the </span><span class="NormalTextRun SCXW80200118 BCX8">organisation</span><span class="NormalTextRun SCXW80200118 BCX8">.</span></li>
</ul>
</div>]]></paragraph>
</block>
<block title="Event log facility"><paragraph
    title="16.6.11.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>The act of logging events is not enough in itself.  For each event logged, sufficient detail needs to be recorded in order for the logs to be useful when reviewed.  An authoritative external time source, a local <strong>Time Source Master Clock or server or</strong> Co-ordinated Universal Time (UTC) is essential for the time-stamping of events and later inspection or forensic examination.  The NZ Interoperability Framework (e-GIF) recognises the time standard for New Zealand as UTC (MSL), with Network Time Protocol (NTP) v.4 as the delivery method over the Internet.</p>]]></paragraph>
<paragraph
    title="16.6.11.R.02."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>New Zealand standard time is maintained by the Measurement Standards Laboratory of New Zealand (MSL), a part of Industrial Research Limited (IRL).  New Zealand standard time is based on UTC, a worldwide open standard used by all modern computer operating systems.  UTC (MSL) is kept within 200 nanoseconds of the international atomic time scale maintained by the Bureau International des Poids et Mesures (BIPM) in Paris.</p>]]></paragraph>
<paragraph
    title="16.6.11.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="2017"
><![CDATA[<p>For each event identified as needing to be logged, agencies MUST ensure that the log facility records at least the following details, where applicable:</p><ul>
<li>date and time of the event;</li>
<li>relevant system user(s) or processes;</li>
<li>event description;</li>
<li>success or failure of the event;</li>
<li>event source (e.g. application name); and</li>
<li>IT equipment location/identification.</li>
</ul>]]></paragraph>
<paragraph
    title="16.6.11.C.02."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2018"
><![CDATA[<p>Agencies SHOULD establish an authoritative time source.</p>]]></paragraph>
<paragraph
    title="16.6.11.C.03."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2019"
><![CDATA[<p>Agencies SHOULD synchronise all logging and audit trails with the time source to allow accurate time stamping of events.</p>]]></paragraph>
</block>
<block title="Event log protection"><paragraph
    title="16.6.12.R.01."

    tags="Technical,Access Control,Passwords,Event Logging"


><![CDATA[<p>Effective log protection and storage (possibly involving the use of a dedicated event logging server) will help ensure the integrity and availability of the collected logs when they are audited.</p>]]></paragraph>
<paragraph
    title="16.6.12.C.01."

    tags="Technical,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="2022"
><![CDATA[<div class="OutlineElement Ltr SCXW123026381 BCX8">
<p class="Paragraph SCXW123026381 BCX8"><span class="TextRun SCXW123026381 BCX8"><span class="NormalTextRun SCXW123026381 BCX8">Event logs </span><span class="NormalTextRun SCXW123026381 BCX8">MUST</span><span class="NormalTextRun SCXW123026381 BCX8"> be protected from:</span></span><span class="EOP SCXW123026381 BCX8">&nbsp;</span></p>
</div>
<div class="ListContainerWrapper SCXW123026381 BCX8">
<ul>
<li class="Paragraph SCXW123026381 BCX8"><span class="TextRun SCXW123026381 BCX8"><span class="NormalTextRun SCXW123026381 BCX8">m</span><span class="NormalTextRun SCXW123026381 BCX8">odification</span><span class="NormalTextRun SCXW123026381 BCX8">;</span></span></li>
<li class="Paragraph SCXW123026381 BCX8"><span class="TextRun SCXW123026381 BCX8"><span class="NormalTextRun SCXW123026381 BCX8">unauthorised access</span><span class="NormalTextRun SCXW123026381 BCX8">;</span><span class="NormalTextRun SCXW123026381 BCX8"> and</span></span></li>
<li class="Paragraph SCXW123026381 BCX8"><span class="TextRun SCXW123026381 BCX8"><span class="NormalTextRun SCXW123026381 BCX8">whole or partial loss within the defined retention period.</span></span><span class="EOP SCXW123026381 BCX8">&nbsp;</span></li>
</ul>
</div>]]></paragraph>
<paragraph
    title="16.6.12.C.02."

    tags="Technical,Access Control,Passwords,Event Logging"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="2023"
><![CDATA[<p>Agencies MUST configure systems to save event logs to separate secure servers as soon as possible after each event occurs.</p>]]></paragraph>
<paragraph
    title="16.6.12.C.03."

    tags="Technical,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2024"
><![CDATA[<p>Agencies SHOULD ensure that:</p><ul>
<li>systems are configured to save event logs to a separate secure log server; and</li>
<li>event log data is archived in a manner that maintains its integrity.</li>
</ul>]]></paragraph>
</block>
<block title="Event log archives"><paragraph
    title="16.6.13.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>It is important that agencies determine the appropriate length of time to retain DNS, proxy, event systems and other operational logs.  Logs are an important information source in reviews, audits and investigations ideally these should be retained for the life of the system or longer. </p>]]></paragraph>
<paragraph
    title="16.6.13.R.02."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>The Archives, Culture, and Heritage Reform Act 2000, the Public Records Act 2005 and the Official Information Act 1982  may determine or influence the length of time that logs need to be retained and if they should be archived.</p>]]></paragraph>
<paragraph
    title="16.6.13.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="2028"
><![CDATA[<p>Event logs MUST be archived and retained for an appropriate period as determined by the agency.</p>]]></paragraph>
<paragraph
    title="16.6.13.C.02."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="2029"
><![CDATA[<p>Disposal or archiving of DNS, proxy, event, systems and other operational logs MUST be in accordance with the provisions of the relevant legislation.</p>]]></paragraph>
<paragraph
    title="16.6.13.C.03."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2030"
><![CDATA[<p>Agencies SHOULD seek advice and determine if their logs are subject to legislation.</p>]]></paragraph>
<paragraph
    title="16.6.13.C.04."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="2031"
><![CDATA[<p><span class="TextRun SCXW245589667 BCX8"><span class="NormalTextRun SCXW245589667 BCX8">Agencies</span><span class="NormalTextRun SCXW245589667 BCX8"> SHOULD </span><span class="NormalTextRun SCXW245589667 BCX8">retain</span><span class="NormalTextRun SCXW245589667 BCX8"> DNS, </span><span class="NormalTextRun SCXW245589667 BCX8">proxy</span><span class="NormalTextRun SCXW245589667 BCX8"> and event logs for a</span><span class="NormalTextRun SCXW245589667 BCX8"> minimum of</span></span><span class="TextRun Highlight SCXW245589667 BCX8"><span class="NormalTextRun SCXW245589667 BCX8"> 1</span><span class="NormalTextRun SCXW245589667 BCX8">2</span><span class="NormalTextRun SCXW245589667 BCX8"> months</span></span><span class="TextRun SCXW245589667 BCX8"><span class="NormalTextRun SCXW245589667 BCX8">.</span></span></p>]]></paragraph>
<paragraph
    title="16.6.13.C.05."

    tags="Technical,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="7557"
><![CDATA[<p><span class="TextRun Highlight SCXW250297705 BCX8"><span class="NormalTextRun SCXW250297705 BCX8">Agencies</span><span class="NormalTextRun SCXW250297705 BCX8"> should prioritise their log retention </span><span class="NormalTextRun SCXW250297705 BCX8">requirements based on the risks surrounding their most sensitive systems</span><span class="NormalTextRun SCXW250297705 BCX8">.</span></span></p>]]></paragraph>
</block>
<block title="Event log auditing"><paragraph
    title="16.6.14.R.01."

    tags="Governance,Access Control,Passwords,Event Logging"


><![CDATA[<p>Conducting audits of event logs is seen as an integral part of the maintenance of systems, as they will assist in the detection and attribution of any violations of agency security policy, including information security incidents, breaches and intrusions.</p>]]></paragraph>
<paragraph
    title="16.6.14.C.01."

    tags="Governance,Access Control,Passwords,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="2034"
><![CDATA[<p>Agencies MUST develop and document event log audit requirements covering:</p><ul>
<li>the scope of audits;</li>
<li>the audit schedule;</li>
<li>action to be taken when violations are detected;</li>
<li>reporting requirements; and</li>
<li>roles and specific responsibilities.</li>
</ul>]]></paragraph>
</block>
<block title="Event log monitoring"><paragraph
    title="16.6.15.R.01."


><![CDATA[<div class="OutlineElement Ltr SCXW90464468 BCX8">
<p class="Paragraph SCXW90464468 BCX8"><span class="TextRun Highlight SCXW90464468 BCX8"><span class="NormalTextRun SCXW90464468 BCX8">Event log monitoring is </span><span class="NormalTextRun AdvancedProofingIssueV2Themed SCXW90464468 BCX8">similar to</span> <span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW90464468 BCX8">auditing,</span><span class="NormalTextRun SCXW90464468 BCX8"> however monitoring is conducted in near-real time. This provides early detection of any incidents and potential authentication violations and incidents.&nbsp;</span></span><span class="EOP SCXW90464468 BCX8">&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW90464468 BCX8">
<p class="Paragraph SCXW90464468 BCX8"><span class="TextRun Highlight SCXW90464468 BCX8"><span class="NormalTextRun SCXW90464468 BCX8">Early identification of anomalies can protect the security posture of a system.</span></span></p>
</div>]]></paragraph>
<paragraph
    title="16.6.15.R.02."


><![CDATA[<p><span class="TextRun Highlight SCXW224985548 BCX8"><span class="NormalTextRun SCXW224985548 BCX8">Monitoring of event logs is essential to understand what system ‘normal’ look like to be able to detect future authentication violations and anomalies.</span></span></p>]]></paragraph>
<paragraph
    title="16.6.15.C.01."

    tags="Technical,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="7560"
><![CDATA[<p><span class="TextRun Highlight SCXW245238288 BCX8"><span class="NormalTextRun SCXW245238288 BCX8">Agencies</span><span class="NormalTextRun SCXW245238288 BCX8"> SHOULD have a monitoring solution implemented that enables detection of incidents as they occur so that </span><span class="NormalTextRun SCXW245238288 BCX8">appropriate responses</span><span class="NormalTextRun SCXW245238288 BCX8"> can be taken in adequate </span><span class="NormalTextRun SCXW245238288 BCX8">timeframes</span><span class="NormalTextRun SCXW245238288 BCX8">.</span></span></p>]]></paragraph>
<paragraph
    title="16.6.15.C.02."

    tags="Technical,Event Logging"


    classification="All Classifications"
    compliance="Should"
    cid="7561"
><![CDATA[<p><span class="TextRun Highlight SCXW216480023 BCX8"><span class="NormalTextRun SCXW216480023 BCX8">Agencies</span><span class="NormalTextRun SCXW216480023 BCX8"> SHOULD have systems available for processing system event logs to </span><span class="NormalTextRun SCXW216480023 BCX8">identify</span><span class="NormalTextRun SCXW216480023 BCX8"> and correlate events which </span><span class="NormalTextRun SCXW216480023 BCX8">indicate</span><span class="NormalTextRun SCXW216480023 BCX8"> behavioural anomalies or potential security compromise in the systems, in a near real-time manner.</span></span></p>]]></paragraph>
</block>
</subsection>
</section>
