Skip to content
arrow_back
search
ISM-1986 policy ASD Information Security Manual (ISM)

Timely Analysis of Critical Server Event Logs

Event logs from important servers are quickly reviewed to find security issues.

record_voice_over

Plain language

This control is about keeping a close eye on event logs from your important servers to quickly spot any signs of trouble. If you don't regularly check these logs, you might miss early signs of a cyber attack, which could lead to data loss or business disruption.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Event logs from critical servers are analysed in a timely manner to detect cyber security events.
policy ASD Information Security Manual (ISM) ISM-1986
priority_high

Why it matters

If critical server event logs are not analysed promptly, intrusions and misuse may go undetected, leading to data compromise and service outages.

settings

Operational notes

Analyse critical server event logs daily (within 24 hours) via SIEM; investigate anomalies and escalate suspected incidents immediately.

Mapping detail

Mapping

Direction

Controls