Skip to content
arrow_back
search
ISM-1960 policy ASD Information Security Manual (ISM)

Timely Analysis of Event Logs for Cybersecurity

Internet-facing device logs are quickly reviewed to find security issues.

record_voice_over

Plain language

Event logs from devices that connect to the internet are reviewed quickly to catch any security issues. This is important because if someone tries to hack your network or steal your information, the logs might show unusual activity. If these aren't checked regularly, you might miss early warnings and suffer data loss or a cyber incident that could have been prevented.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Event logs from internet-facing network devices are analysed in a timely manner to detect cyber security events.
policy ASD Information Security Manual (ISM) ISM-1960
priority_high

Why it matters

Delayed analysis of internet-facing device logs can lead to undetected intrusions, resulting in data breaches and compromised network integrity.

settings

Operational notes

Review internet-facing device event logs daily and alert on suspicious activity (e.g., repeated failed logins, config changes), escalating incidents for investigation.

Mapping detail

Mapping

Direction

Controls