Under active development Content is continuously updated and improved

5.2.45.2.4

>Control Description

+ Information security requirements regarding the handling of event logs are determined and fulfilled. + Security-relevant requirements regarding the logging of activities of system administrators and users are determined and fulfilled. + The IT systems used are assessed regarding the necessity of logging. + When using external IT services, information on the monitoring options is obtained and considered in the assessment. + Event logs are checked regularly for rule violations and noticeable problems in compliance with the permissible legal and organizational provisions.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.