8.12
IG3

Collect Service Provider Logs

Control Group: 8. Audit Log Management
Asset Type: Data
Security Function: Detect

Description

Collect service provider logs, where supported. Example implementations include collecting authentication and authorization events, data creation and disposal events, and user management events.

Implementation Checklist

1
Deploy detection tools or enable detection capabilities
2
Configure alerting thresholds and notification channels
3
Establish monitoring schedule and review process
4
Test detection capabilities with simulated events
5
Document detection procedures and escalation paths
6
Enable logging on all in-scope systems
7
Configure log forwarding to centralized SIEM
8
Define log retention periods per policy
9
Establish log review schedule and procedures
10
Identify systems requiring multi-factor authentication
11
Select and deploy MFA solution
12
Enroll users and distribute authentication factors
13
Test MFA across all identified systems
14
Inventory all third-party service providers
15
Classify third parties by risk level
16
Conduct security assessments of critical vendors
17
Include security requirements in contracts

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

SaaS Account Compromise Without Audit Visibility

Confidentiality

Attackers compromise credentials for cloud service provider platforms (Microsoft 365, AWS, Salesforce) and the organization has no visibility into authentication events, privilege changes, or data access because service provider logs are not collected.

Cloud Data Exfiltration via Unmonitored Provider APIs

Confidentiality

Sensitive data stored in cloud platforms is accessed or exported through provider APIs and sharing mechanisms, but without collecting service provider logs the organization cannot detect unauthorized data access or exfiltration from these platforms.

Shadow Administrator Activity in Cloud Services

Integrity

Unauthorized privilege escalation or admin account creation in cloud service providers goes undetected because user management events from these platforms are not collected or monitored by the enterprise security team.

Vulnerabilities (When Safeguard Absent)

No Integration with Cloud Service Provider Log APIs

The organization has not configured log collection from cloud service providers (AWS CloudTrail, Azure Activity Logs, Google Cloud Audit Logs, Microsoft 365 Unified Audit Log), leaving all cloud-based activity unmonitored.

SaaS Application Logs Not Forwarded to Central SIEM

Business-critical SaaS applications have audit logging capabilities, but their logs are not forwarded to the enterprise SIEM, creating visibility gaps for applications that process sensitive data outside the on-premises infrastructure.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Detection tool deployment evidence (dashboard screenshots, agent status) Captured monthly
Technical Sample alert/detection output demonstrating capability Captured quarterly
Technical SIEM dashboard showing log sources and collection status Captured monthly
Record Log review records and findings Per review cycle
Record Third-party risk assessment reports and scorecards Annually per vendor
Document Vendor contracts with security requirements Per contract cycle
Document Governing policy document (current, approved, communicated) Reviewed annually