Logging and Monitoring Policy Template Ready to Go
Do you want to know what your employees are doing on work computers?
If so, this Logging and Monitoring Policy Template will help you. It sets out the company position on logging and monitoring as well as the protection of those logs. We want to record what administrators and users are doing so that if we need to investigate we can do so reliably. This policy also covers how long logs should be kept for, who has access to them, where they’re stored etc.
Logging and Monitoring
The Logging and Monitoring Policy Template purpose is to address the identification and management of risk the of system based security events by logging and monitoring systems. To record events and gather evidence. For PCI DSS we have the nuance that all devices that process, store, or transmit confidential, card holder or personal information have audit and logging enabled, where logging is possible and practical and can generate audit logs. We operate within the law at all times.
Logging and Monitoring Policy Template Contents
It comes with a handy and easy to follow guide on how to implement and deploy policies and it includes:
- Document Version Control
- Document Contents Page
- Logging and Monitoring Policy
- Event Logging
- Event Logging Access Control
- Protection of Event Log Information
- Administrator and operator logs
- Clock synchronisation
- Event Log Monitoring
- Event Log Retention
- Centralised Logging
- Personal Privacy
- Policy Compliance
- Compliance Measurement
- Continual Improvement
The policy has appropriate ISO 27001 required document mark up for classification, version control, document owner and last reviewed.
Real Customer Stories- Rated 5/5 stars
Why hundreds of businesses and information security professionals love High Table.
Meet the team behind the templates
Practitioners for over 20 years in Governance, Risk and Compliance. These are the tools we use day in day out.