Skip to content
arrow_back
search
ISM-1815 policy ASD Information Security Manual (ISM)

Protect Event Logs from Unauthorised Access

Ensure logs are safe from changes or deletion by unauthorised users.

record_voice_over

Plain language

Event logs are records of what's happening in your computer systems. Protecting these logs from unauthorised changes or deletion is crucial because, if tampered with, it can hide intrusions or other malicious activities by masking suspicious behaviour.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2, ML3

Official control statement

Event logs are protected from unauthorised modification and deletion.
policy ASD Information Security Manual (ISM) ISM-1815
priority_high

Why it matters

If event logs can be modified or deleted, attackers can hide evidence of compromise, delaying detection and weakening investigations and response.

settings

Operational notes

Restrict log access to admins only, enable append-only/immutable storage where possible, and routinely check integrity (hashing/alerts) for changes or deletions.

Mapping detail

Mapping

Direction

Controls