Skip to content
arrow_back
search
ISM-1987 policy ASD Information Security Manual (ISM)

Timely Analysis of Security Event Logs

Security event logs are reviewed promptly to identify cyber threats.

record_voice_over

Plain language

This control is about keeping a close eye on security events by regularly checking the logs of security systems. It's important because if you don't promptly review these logs, you might miss early signs of a cyber threat like hacking or data breaches. Being timely helps you respond quickly, stopping potential security issues before they become major problems.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Event logs from security products are analysed in a timely manner to detect cyber security events.
policy ASD Information Security Manual (ISM) ISM-1987
priority_high

Why it matters

Delayed analysis of security logs allows cyber threats to escalate, increasing the risk of significant data breaches or system compromises.

settings

Operational notes

Configure SIEM and security tools to alert on suspicious events in near real time, and perform daily log review with escalation and triage procedures.

Mapping detail

Mapping

Direction

Controls