Skip to content
arrow_back
search
E8-RA-ML2.8 bolt ASD Essential Eight

Event logs are protected from unauthorised changes and losses

Ensure event logs cannot be changed or deleted without authorization.

record_voice_over

Plain language

Ensuring event logs are protected from unauthorised changes is crucial because these logs are like a diary of all the important activities and security events happening on your systems. If someone with bad intent changes or deletes these logs without permission, it covers up evidence of malicious activities, making it harder to spot and fix problems before they become bigger issues.

Framework

ASD Essential Eight

Control effect

Preventative

E8 mitigation strategy

Restrict administrative privileges

Classifications

N/A

Official last update

N/A

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2

Official control statement

Event logs are protected from unauthorised modification and deletion.
bolt ASD Essential Eight E8-RA-ML2.8
priority_high

Why it matters

Unauthorised log changes can conceal cyber intrusions, undermine forensic evidence, and delay threat detection, escalating organisational risk.

settings

Operational notes

Ensure logs have strict access controls and immutable storage; routinely monitor and alert on unauthorised attempts to alter or delete log data.

Mapping detail

Mapping

Direction

Controls