Skip to content
arrow_back
search
ISM-1961 policy ASD Information Security Manual (ISM)

Timely Analysis of Network Device Event Logs

Analyse logs from internal network devices quickly to detect security events.

record_voice_over

Plain language

This control is about regularly checking the logs from your organisation's network devices—like routers and switches—to spot any unusual or suspicious activity. If this isn't done, potential security threats could go unnoticed, leaving your business vulnerable to attacks or data breaches.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Event logs from non-internet-facing network devices are analysed in a timely manner to detect cyber security events.
policy ASD Information Security Manual (ISM) ISM-1961
priority_high

Why it matters

Failure to analyse network device logs promptly can allow undetected intrusions, leading to data breaches or loss of critical business assets.

settings

Operational notes

Review non-internet-facing network device event logs daily and alert on auth failures, config changes and unusual admin access; tune rules and escalate suspected incidents promptly.

Mapping detail

Mapping

Direction

Controls