Skip to main content

This chapter of the ISM provides guidance on system monitoring.

System monitoring is able to contribute to the security posture of a system, detect potential cyber security incidents and contribute to investigations following cyber security incidents. This chapter outlines how system events can be logged and audited.