Skip to main content

๐Ÿ’ผ 10.6 Review logs and security events for all system components to identify anomalies or suspicious activity.

Descriptionโ€‹

Log harvesting, parsing, and alerting tools may be used to meet this Requirement.

Similarโ€‹

  • Internal
    • ID: dec-c-c3738046

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 10.6.1 Review security events and critical system component logs at least daily.
๐Ÿ’ผ 10.6.2 Review logs of all other system components periodically based on the organization's policies and risk management strategy, as determined by the organization's annual risk assessment.1
๐Ÿ’ผ 10.6.3 Follow up exceptions and anomalies identified during the review process.