Skip to content
arrow_back
search
ISM-1405 policy ASD Information Security Manual (ISM)

Implement a Centralised Event Logging Facility

Ensure all event logs are collected and managed in one central location for analysis and security monitoring.

record_voice_over

Plain language

Having a central spot where all your system's event logs are gathered is like having a single bulletin board where you can track everything going on in your business. This matters because if you can't see what's happening across all your systems, you might miss warning signs of a security threat or system issue, which could cost you time, money, or damage your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

A centralised event logging facility is implemented.
policy ASD Information Security Manual (ISM) ISM-1405
priority_high

Why it matters

Without a centralised event logging facility, security events are fragmented across systems, delaying detection and investigation of suspicious activity and increasing incident impact.

settings

Operational notes

Centralise logs from key systems, normalise formats, and enforce time synchronisation (NTP). Monitor and alert regularly, and set retention to support investigations and trend analysis.

Mapping detail

Mapping

Direction

Controls