8.9
IG2 IG3

Centralize Audit Logs

Control Group: 8. Audit Log Management
Asset Type: Network
Security Function: Detect

Description

Centralize, to the extent possible, audit log collection and retention across enterprise assets.

Implementation Checklist

1
Deploy detection tools or enable detection capabilities
2
Configure alerting thresholds and notification channels
3
Establish monitoring schedule and review process
4
Test detection capabilities with simulated events
5
Document detection procedures and escalation paths
6
Enable logging on all in-scope systems
7
Configure log forwarding to centralized SIEM
8
Define log retention periods per policy
9
Establish log review schedule and procedures
10
Select centralized management platform
11
Integrate all in-scope systems and data sources
12
Configure dashboards and reporting

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Cross-System Attack Patterns Lost in Distributed Logs

Confidentiality

Sophisticated multi-stage attacks spanning multiple systems go undetected because logs remain on individual assets where each fragment appears benign, and only centralized correlation would reveal the complete attack pattern.

Log Destruction by Attackers on Compromised Hosts

Integrity

Attackers with administrative access to compromised systems delete or tamper with local log files to cover their tracks, and without centralized log collection these audit trails are permanently lost.

Delayed Breach Detection from Manual Log Review

Confidentiality

Without centralized log aggregation, security analysts must manually access individual systems to review logs, dramatically increasing the time to detect breaches and extending attacker dwell time from days to months.

Vulnerabilities (When Safeguard Absent)

No Centralized SIEM or Log Aggregation Platform

Audit logs remain on individual assets with no centralized collection, making cross-system correlation impossible, increasing investigation time exponentially, and leaving logs vulnerable to local tampering by attackers.

Partial Log Forwarding with Missing Source Types

Log centralization covers only some asset categories while others (cloud services, network devices, Linux hosts) retain logs locally, creating blind spots in centralized monitoring and correlation capabilities.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Detection tool deployment evidence (dashboard screenshots, agent status) Captured monthly
Technical Sample alert/detection output demonstrating capability Captured quarterly
Technical SIEM dashboard showing log sources and collection status Captured monthly
Record Log review records and findings Per review cycle
Document Governing policy document (current, approved, communicated) Reviewed annually