Skip to content
arrow_back
search
ISM-1985 policy ASD Information Security Manual (ISM)

Protect Event Logs from Unauthorised Access

Ensure that only authorised individuals can view or access event logs.

record_voice_over

Plain language

Protecting event logs means keeping a close eye on who can see or change the digital records of what happens in your systems. If unauthorised people access these logs, they could cover up harmful activities or misuse sensitive information, leading to trust issues and potential harm to your business.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Event logs are protected from unauthorised access.
policy ASD Information Security Manual (ISM) ISM-1985
priority_high

Why it matters

If event logs are not protected, attackers can alter or delete entries to hide activity, undermining investigations and causing reputational damage.

settings

Operational notes

Audit and restrict event log access (read/export/delete) to approved roles only, and regularly review permissions to detect and remove unauthorised access.

Mapping detail

Mapping

Direction

Controls