Skip to content
arrow_back
search
ISM-2052 policy ASD Information Security Manual (ISM)

Ensure Event Logs Protect Sensitive Data

Event logs must keep sensitive information safe and secured.

record_voice_over

Plain language

Event logs are like a diary of your computer systems, keeping track of what happens over time. It's crucial to ensure these logs don't accidentally reveal private information. If sensitive data leaks through logs, it could be misused by hackers, leading to data breaches or identity theft.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Event logs produced by software ensure that any sensitive data is protected.
policy ASD Information Security Manual (ISM) ISM-2052
priority_high

Why it matters

If event logs expose sensitive data, attackers may use it to gain access or exfiltrate data, causing breaches, incident response costs and reputational damage.

settings

Operational notes

Audit logging to prevent secrets/PII in logs; mask or encrypt values and restrict log access to approved admins. Periodically test by reviewing sample log entries.

Mapping detail

Mapping

Direction

Controls