L Logging & Alerting · 5 controls

Logging & Alerting

Logging & Alerting controls ensure that security-relevant events are captured, collected, analyzed, and escalated. Without comprehensive logging, detection and forensic capabilities are severely limited.

L1
Control
Log Coverage

Critical systems are identified and onboarded to centralized logging: endpoints, network devices, identity systems, cloud platforms, applications, and security tooling. New systems are evaluated for logging requirements before production. Log sources are prioritized by risk and criticality.

L2
Control
Collection & Retention

Logs are centrally collected in near real-time. Log integrity is protected through encryption in transit and access controls. Retention periods meet regulatory and business requirements.

L3
Control
Normalization & Enrichment

Ingested logs are normalized to a standard schema for consistent analysis. Logs are enriched with contextual metadata where available (asset criticality, user identity, threat intelligence indicators). Parsing rules are reviewed periodically.

L4
Control
Detection Rules & Tuning

Detection rules are implemented for defined use cases with severity classification. Rules are tuned regularly to manage false positive and false negative rates. Changes to detection logic follow change management procedures.

L5
Control
Alerting & Escalation

Alerts route through a defined pipeline: automated triage, ticket creation, notification to response teams. High and critical severity alerts trigger immediate paging. Escalation procedures and response SLAs are documented.

Maturity Scale
0
Not Implemented
Absent or entirely ad hoc
1
Basic
Initial implementation with significant gaps
2
Mature
Consistent implementation with minor gaps
3
Advanced
Comprehensive with continuous improvement