Skip to main content

💼 10.6 Review logs and security events for all system components to identify anomalies or suspicious activity.

Description​

Log harvesting, parsing, and alerting tools may be used to meet this Requirement.

Similar​

  • Internal
    • ID: dec-c-c3738046

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 10.6.1 Review security events and critical system component logs at least daily.2
💼 10.6.2 Review logs of all other system components periodically based on the organization's policies and risk management strategy, as determined by the organization's annual risk assessment.5
💼 10.6.3 Follow up exceptions and anomalies identified during the review process.2