🚨 CMMC Phase One started November 10! Here's everything you need to know →

Requirement:

The cybersecurity requirements for event logs and monitoring management must be reviewed periodically.

Control Implementation Guidelines:

  • Review the cybersecurity requirements of Cybersecurity Event Logs and Monitoring Management by conducting a periodic assessment (according to a documented and approved plan for review, and based on a planned interval "e.g., quarterly") to implement cybersecurity Event Logs and Monitoring Management requirements by the Cybersecurity function and in cooperation with relevant departments (such as security operations center, if any)
  • Conduct application review through traditional channels (e.g., email) or automated channels using a compliance management system. The organization may develop a review plan explaining the implementation review schedule for Cybersecurity Event Logs and Monitoring Management
  • Review and update cybersecurity requirements for Cybersecurity Event Logs and Monitoring Management in the organization periodically according to a documented and approved plan for review and based on a planned interval or in the event of changes in relevant laws and regulations
  • Document the review and changes to the cybersecurity requirements for Cybersecurity Event Logs and Monitoring Management in the organization and approve them by the head of the organization or his/her deputy

Expected Deliverables:

  • Results of Cybersecurity Event Logs and Monitoring Management requirements implementation review in the organization
  • A document that defines the cybersecurity requirements implementation review cycle for Cybersecurity Event Logs and Monitoring Management within the organization (Compliance Assessment Schedule)
  • Compliance assessment report that outlines the assessment of the implementation of cybersecurity requirements for Cybersecurity Event Logs and Monitoring Management
  • An approved document that sets the policy's review schedule
  • Policy indicating that it has been reviewed and updated, and that changes have been documented and approved by the head of the organization or his/her deputy
  • Formal approval by the head of the organization or his/her deputy on the updated policy (e.g., via the organization's official e-mail, paper or electronic signature)
 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes