0% found this document useful (0 votes)
87 views5 pages

ISO/IEC 27001:2013 Information Security Management Systems - Logging and Monitoring

The document discusses ISO/IEC 27001:2013 controls for logging and monitoring. It outlines that event logs should record user activities, exceptions, and security events. Logs are valuable for investigating incidents and determining accountability. Logs should include details like user IDs, system activities, dates and times of key events. Log reviews must respect segregation of duty. Logs should be protected from tampering and kept for sufficient time for investigations. The activities of administrators and operators should also be logged and protected. Clock synchronization is important to ensure accurate timestamps on logs across relevant systems.

Uploaded by

elbose
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views5 pages

ISO/IEC 27001:2013 Information Security Management Systems - Logging and Monitoring

The document discusses ISO/IEC 27001:2013 controls for logging and monitoring. It outlines that event logs should record user activities, exceptions, and security events. Logs are valuable for investigating incidents and determining accountability. Logs should include details like user IDs, system activities, dates and times of key events. Log reviews must respect segregation of duty. Logs should be protected from tampering and kept for sufficient time for investigations. The activities of administrators and operators should also be logged and protected. Clock synchronization is important to ensure accurate timestamps on logs across relevant systems.

Uploaded by

elbose
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

ISO/IEC 27001:2013 Information security management systems

-Logging and monitoring-

Security category – 12.4. Logging and monitoring

Control – 12.4.1. Event logging


Event logs record user activities, exceptions, faults and security events. The
organization should ensure that such logs are produced, kept and regularly
reviewed.

Logs are valuable to investigate incidents, events that led to security problems and to
determine who is accountable for different activities.

For every information processing facility there should be an event log kept – that is
independent and not accessible by the user.
ISO/IEC 27001:2013 Information security management systems
-Logging and monitoring-
Some guidelines for what event logs should refer to:

a) user IDs;
b) system activities;
c) dates, times and details of key events, e.g. log-on and log-off;
d) device identity or location if possible;
e) records of successful and rejected system access attempts;
f) changes to system configuration;
g) use of privileges;
h) use of system utilities and applications;
i) files accessed;
j) alarms raised;
k) activation and de-activation of protection systems, such as the anti-virus systems;
l) records of transactions executed by users in applications…

Review of logs should respect the segregation of duty principle.


Logs should be kept for a sufficient period of time so that they can be used if needed for an investigation.
ISO/IEC 27001:2013 Information security management systems
-Logging and monitoring-

Control – 12.4.2. Protection of log information


The organization should protect logging facilities and log information against
tampering and unauthorized access.

The information contained in logs is valuable as log as its integrity is preserved.

Controls should aim to protect against unauthorized changes like: editing or deleting the
information recorded; modifying the type of information that is being recorded or
overwriting logs because storage capacity is exceeded.

A method to safeguard logs is to copy them in real time to a system outside the control of
the system administrator.
ISO/IEC 27001:2013 Information security management systems
-Logging and monitoring-

Control – 12.4.3. Administrator and operator logs


The activities of system administrators and the activities of operators should be
logged and the logs should be protected and reviewed regularly.

A user with privileges may be able to manipulate logs so its necessary to employ some
protection for such situations.

An intrusion detection system managed outside the control of the administrator is a solution
proposed by ISO/IEC 27002 for the control of logs.
ISO/IEC 27001:2013 Information security management systems
-Logging and monitoring-

Control – 12.4.4. Clock synchronization


The clocks of all relevant information processing systems within an organization
or security domain should be synchronized to a single reference time source.

An internal reference time should be established, documented and implemented.

Clock synchronization is needed because most logs are time and date stamped.

In most cases – reference time is local time.


For organizations with multiple locations – a reference time should be decided.

All system clocks should be automatically synchronized with a master clock.

You might also like