Skip to content
arrow_back
search
ISM-0580 policy ASD Information Security Manual (ISM)

Develop and Maintain Event Logging Policies

Ensure a policy is in place to record and monitor events.

record_voice_over

Plain language

Having a policy to log and monitor events means you'd keep a record of important actions that happen on your computer systems. This is crucial because without such records, if something goes wrong—like data being stolen—you won't know how it happened or how to fix it.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

An event logging policy is developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-0580
priority_high

Why it matters

Without an event logging policy, key events may not be captured or retained, reducing detection capability and hindering timely investigation and incident response.

settings

Operational notes

Maintain an event logging policy defining what to log, roles, review cadence, alerting and retention; periodically validate coverage and update for system changes.

Mapping detail

Mapping

Direction

Controls