Information Gathering -> Logging: Logging of security events
Risk and Opportunity
Risk: No track of security-relevant events makes it harder to analyse an incident.
Opportunity: Security-relevant events like login/logout or creation, change, deletion of users should be logged.
Required knowledge: Very Low (one discipline)
Required time: Very Low
Required resources (systems): Very Low
Dependencies: PII logging concept
Implementation hints: rsyslog, logstash, fluentd, bash
OWASP SAMM 2 Mapping: o-incident-management|A|1
ISO27001:2017 Controls Mapping: