Skip to content
arrow_back
search
ISM-2051 policy ASD Information Security Manual (ISM)

Ensure Event Logs for Cybersecurity Event Detection

Software should create logs to help detect security incidents.

record_voice_over

Plain language

Software should automatically keep a record of important activities and events. This is crucial because if something goes wrong, like a cyberattack or data breach, these logs can help us understand what happened and how to fix it.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Software generates sufficient event logs to support the detection of cyber security events.
policy ASD Information Security Manual (ISM) ISM-2051
priority_high

Why it matters

If software does not generate sufficient event logs, cyber security events may not be detected or investigated, increasing dwell time and impact on organisational assets.

settings

Operational notes

Configure software to generate security-relevant logs (auth, privilege, admin actions, errors) with timestamps and user IDs, and regularly verify coverage and fields needed for detection.

Mapping detail

Mapping

Direction

Controls