Requirement:
The cybersecurity requirements for event logs and monitoring management must be reviewed periodically.
Control Implementation Guidelines:
- Review the cybersecurity requirements of Cybersecurity Event Logs and Monitoring Management by conducting a periodic assessment (according to a documented and approved plan for review, and based on a planned interval "e.g., quarterly") to implement cybersecurity Event Logs and Monitoring Management requirements by the Cybersecurity function and in cooperation with relevant departments (such as security operations center, if any)
- Conduct application review through traditional channels (e.g., email) or automated channels using a compliance management system. The organization may develop a review plan explaining the implementation review schedule for Cybersecurity Event Logs and Monitoring Management
- Review and update cybersecurity requirements for Cybersecurity Event Logs and Monitoring Management in the organization periodically according to a documented and approved plan for review and based on a planned interval or in the event of changes in relevant laws and regulations
- Document the review and changes to the cybersecurity requirements for Cybersecurity Event Logs and Monitoring Management in the organization and approve them by the head of the organization or his/her deputy
Expected Deliverables:
- Results of Cybersecurity Event Logs and Monitoring Management requirements implementation review in the organization
- A document that defines the cybersecurity requirements implementation review cycle for Cybersecurity Event Logs and Monitoring Management within the organization (Compliance Assessment Schedule)
- Compliance assessment report that outlines the assessment of the implementation of cybersecurity requirements for Cybersecurity Event Logs and Monitoring Management
- An approved document that sets the policy's review schedule
- Policy indicating that it has been reviewed and updated, and that changes have been documented and approved by the head of the organization or his/her deputy
- Formal approval by the head of the organization or his/her deputy on the updated policy (e.g., via the organization's official e-mail, paper or electronic signature)
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you