Skip to content
arrow_back
search
ISM-1537 policy ASD Information Security Manual (ISM)

Log Security-Relevant Database Events Centrally

Keep track of important activities in databases, like access, changes, and issues, to ensure security.

record_voice_over

Plain language

This control means you need to keep a central log of important activities happening in your databases, like whenever someone accesses, changes, or tries to break into them. If you don't do this, you might miss signs of a security breach, like someone stealing sensitive information or causing damage, which could lead to financial loss or damage to your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Security-relevant events for databases are centrally logged, including: - access or modification of particularly important content - addition of new users, especially privileged users - changes to user roles or privileges - attempts to elevate user privileges - queries containing comments - queries containing multiple embedded queries - database and query alerts or failures - database structure changes - database administrator actions - use of executable commands - database logons and logoffs.
policy ASD Information Security Manual (ISM) ISM-1537
priority_high

Why it matters

Without central logging of security-relevant database events, unauthorised access, privilege escalation, schema changes or admin actions may go undetected, enabling data breaches.

settings

Operational notes

Centrally collect DB audit logs for logons/logoffs, role/privilege changes, admin actions, schema changes and failed alerts; validate ingestion and retention for investigations.

Mapping detail

Mapping

Direction

Controls