Skip to content
arrow_back
search
ISM-0585 policy ASD Information Security Manual (ISM)

Capture Detailed Information in Event Logs

Record details like time, user, and equipment for each logged event.

record_voice_over

Plain language

This control is about keeping a detailed record every time something significant happens in your computer systems. It includes noting the time, who was involved, and the equipment used. If we don't do this, it would be really hard to figure out what went wrong in case of a cyber attack or technical issue, and we might not know how to stop it from happening again.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

For each event logged, the date and time of the event, the relevant user or process, the relevant filename, the event description, and the information technology equipment involved are captured.
policy ASD Information Security Manual (ISM) ISM-0585
priority_high

Why it matters

If event logs lack key fields (time, user/process, filename and device), investigations take longer, root cause may be missed, and incident impact increases.

settings

Operational notes

Audit log configurations to ensure each record includes date/time, user or process, filename, event description and the IT equipment identifier; alert on missing fields.

Mapping detail

Mapping

Direction

Controls