LOG-10: Are monitoring and internal reporting capabilities established to report on
cryptographic operations, encryption, and key management policies, processes,
procedures, and controls?
Compliance breaches and deviations from standard operations should be reported as defined in the organization’s incident management process (as outlined in SEF-01). In addition, file-integrity monitoring or change-detection software should be used to prevent changes in existing log data.
Control implemented
Control ownership
Description
Establish and maintain a monitoring and internal reporting capability
over the operations of cryptographic, encryption and key management policies,
processes, procedures, and controls.