Skip to content
arrow_back
search
E8-AH-ML2.13 bolt ASD Essential Eight

Protect event logs from unauthorized changes or deletion

Ensure event logs cannot be tampered with or erased without permission.

record_voice_over

Plain language

This control is about making sure that important computer records, known as event logs, can’t be changed or erased without the right permissions. Without this protection, someone with bad intentions could hide their tracks after doing something harmful to a computer system.

Framework

ASD Essential Eight

Control effect

Preventative

E8 mitigation strategy

Application hardening

Classifications

N/A

Official last update

N/A

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2

Official control statement

Event logs are protected from unauthorized modification and deletion.
bolt ASD Essential Eight E8-AH-ML2.13
priority_high

Why it matters

If event logs can be altered or deleted without detection, attackers can hide malicious activity, undermining forensic investigations and accountability for incidents.

settings

Operational notes

Store logs on WORM or immutable storage and restrict log admin access; enable auditing/alerting on log changes to prevent unauthorised modification or deletion.

Mapping detail

Mapping

Direction

Controls