Skip to content
arrow_back
search
ISM-1984 policy ASD Information Security Manual (ISM)

Ensure Encryption of Event Logs in Transit

Event logs must be encrypted when being sent to a central system to protect sensitive information.

record_voice_over

Plain language

When your business sends event logs, which track what happens on your systems, to a central location for review, you need to make sure they are sent securely. This is important because if these logs are intercepted, sensitive information could be exposed, leaving your company vulnerable to cyber attacks or data breaches.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Event logs sent to a centralised event logging facility are encrypted in transit.
policy ASD Information Security Manual (ISM) ISM-1984
priority_high

Why it matters

If event logs are sent without encryption, attackers can intercept or alter them, exposing sensitive details and undermining incident detection.

settings

Operational notes

Enforce TLS for log forwarding, validate certificates, and alert on any plaintext syslog/log traffic to the central logging facility.

Mapping detail

Mapping

Direction

Controls