Skip to content
arrow_back
search
E8-MF-ML2.7 bolt ASD Essential Eight

Protect event logs from unauthorized changes

Ensure event logs cannot be changed or deleted without permission.

record_voice_over

Plain language

Protecting event logs from unauthorised changes is like keeping a secure diary of everything that happens on your computer systems. If someone can erase or change the logs, you may never know if something bad, like a cyber attack, happened. This control ensures you have a reliable record to look back on if something goes wrong.

Framework

ASD Essential Eight

Control effect

Detective

E8 mitigation strategy

Multi-factor authentication

Classifications

N/A

Official last update

N/A

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2

Official control statement

Event logs are protected from unauthorised modification and deletion.
bolt ASD Essential Eight E8-MF-ML2.7
priority_high

Why it matters

Unauthorised log changes can conceal security breaches, hindering forensic investigations and enabling ongoing attacks without detection.

settings

Operational notes

Regularly audit event log integrity and alert on unauthorised modification or deletion attempts to maintain accountability and support investigations.

Mapping detail

Mapping

Direction

Controls