Skip to content
arrow_back
search
E8-AC-ML2.6 bolt ASD Essential Eight

Event logs are protected from unauthorised modification and deletion

Ensure that event logs are secure from being changed or deleted by unauthorized users.

record_voice_over

Plain language

Event logs are like security cameras for your computer systems. They record what's happening in the background, which can help investigate suspicious activity. If someone unauthorised could change or delete these logs, you might miss signs of a cyber attack or data breach.

Framework

ASD Essential Eight

Control effect

Detective

E8 mitigation strategy

Application control

Classifications

N/A

Official last update

N/A

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2

Official control statement

Event logs are protected from unauthorised modification and deletion.
bolt ASD Essential Eight E8-AC-ML2.6
priority_high

Why it matters

If unauthorised changes or deletions occur, critical security events can be concealed, making it challenging to detect breaches or understand attack paths.

settings

Operational notes

Restrict log access, use append-only or immutable storage, and monitor for deletions/changes to preserve integrity for investigations and audit.

Mapping detail

Mapping

Direction

Controls