logging
logging Controls
6 controls across 3 frameworks.
CISA CPG
NIST CSF
de-cm-1
Networks and network services are monitored to detect adverse events
Detect / Continuous Monitoring
high 6h
de-cm-9
Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events
Detect / Continuous Monitoring
critical 10h
pr-ps-4
Log records are generated and made available for continuous monitoring
Protect / Platform Security
high 4h