5.2.4—5.2.4
>Control Description
+ Information security requirements regarding the handling of event logs are determined and fulfilled.
+ Security-relevant requirements regarding the logging of activities of system administrators and users are determined and fulfilled.
+ The IT systems used are assessed regarding the necessity of logging.
+ When using external IT services, information on the monitoring options is obtained and considered in the assessment.
+ Event logs are checked regularly for rule violations and noticeable problems in compliance with the permissible legal and organizational provisions.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.