The organization should consider the following for the control's implementation:
a. Logs should be stored in a centralized log management solution with separation of duties maintained by an independent team if possible.
b. Logs should be integrated with a SIEM-type solution for real-time monitoring to raise alerts in case of any violation.
Define, implement and evaluate processes, procedures and technical measures to ensure the logging infrastructure is read-only for all with write access, including privileged access roles, and that the ability to disable it is controlled through a procedure that ensures the segregation of duties and break glass procedures.
The organization should consider the following for the control's implementation:
a. Logs should be stored in a centralized log management solution with separation of duties maintained by an independent team if possible.
b. Logs should be integrated with a SIEM-type solution for real-time monitoring to raise alerts in case of any violation.
Define, implement and evaluate processes, procedures and technical measures to ensure the logging infrastructure is read-only for all with write access, including privileged access roles, and that the ability to disable it is controlled through a procedure that ensures the segregation of duties and break glass procedures.