Cyber Security: Logging and monitoring
							Status: Retired
							
						
									
						
							Published: 
							11/05/2021
						
					
						
							Security level: Official
						
					
						
							Amended / Internally developed: 
							False
						
					
						
						    Live on platform: 
							23/09/2021
						
					
						
						    Retired from platform: 
							03/10/2025
						
				
							Target Audience: Technical / General
						
					
						
							Authoring body: National Cyber Security Centre (NCSC)
						
 
				
					
					
					
				    
    
				
					
					
						Grading: 
    						no grading applied
					
					
				
								Guidance
							
						
		
						Abstract
							Step 8 from the 10 steps to Cyber Security covers how to design your systems to be able to detect and investigate incidents.
Collecting logs is essential to understand how your systems are being used and is the foundation of security (or protective) monitoring. In the event of a concern or potential security incident, good logging practices will allow you to retrospectively look at what has happened and understand the impact of the incident. Security monitoring takes this further and involves the active analysis of logging information to look for signs of known attacks or unusual system behaviour, enabling organisations to detect events that could be deemed as a security incident, and respond accordingly in order to minimise the impact.
							
								Download attachments: 
							
							
									
						
					
	
		
			
			
				
					Category:
					
						
						
							
								
									Security