8.2
IG1 IG2 IG3

Collect Audit Logs

Control Group: 8. Audit Log Management
Asset Type: Network
Security Function: Detect

Description

Collect audit logs. Ensure that logging, per the enterprise’s audit log management process, has been enabled across enterprise assets.

Implementation Checklist

1
Deploy detection tools or enable detection capabilities
2
Configure alerting thresholds and notification channels
3
Establish monitoring schedule and review process
4
Test detection capabilities with simulated events
5
Document detection procedures and escalation paths
6
Enable logging on all in-scope systems
7
Configure log forwarding to centralized SIEM
8
Define log retention periods per policy
9
Establish log review schedule and procedures
10
Draft policy/procedure document
11
Obtain stakeholder review and approval
12
Communicate to affected personnel
13
Schedule periodic review and updates

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Blind Spots Enabling Undetected Compromise

Confidentiality

Attackers specifically target assets where audit logging is disabled or not collected, knowing their activities will leave no forensic trail, enabling prolonged dwell times and undetected data exfiltration.

Tampering Without Evidence on Unlogged Systems

Integrity

Malicious insiders or external attackers modify critical data, configurations, or access controls on systems where audit logs are not collected, making it impossible to detect or attribute unauthorized changes.

Anti-Forensics Exploitation of Logging Gaps

Confidentiality

Sophisticated attackers route their activities through assets without log collection, using these blind spots as staging areas for lateral movement and data staging while remaining invisible to security monitoring.

Vulnerabilities (When Safeguard Absent)

Audit Logging Disabled on Critical Enterprise Assets

Key servers, databases, network devices, and cloud services have audit logging disabled by default or intentionally turned off to conserve resources, creating forensic blind spots across the infrastructure.

Inconsistent Log Collection Across Asset Types

Logging is enabled on some asset categories (e.g., domain controllers) but not others (e.g., Linux servers, network appliances, SaaS applications), leaving significant portions of the environment without audit trails.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Detection tool deployment evidence (dashboard screenshots, agent status) Captured monthly
Technical Sample alert/detection output demonstrating capability Captured quarterly
Technical SIEM dashboard showing log sources and collection status Captured monthly
Record Log review records and findings Per review cycle
Document Governing policy document (current, approved, communicated) Reviewed annually