The organization shall ensure that a baseline of network operations and expected data flows for its critical
systems is developed, documented, and maintained to track events.
Guidance
- Consider enabling local logging on all your systems and network devices and keep them for a certain
period, for example up to 6 months.
- Ensure that your logs contain enough information (source, date, user, timestamp, etc.) and that you
have enough storage space for their generation.
- Consider centralizing your logs.
- Consider deploying a Security Information and Event Management tool (SIEM) that will facilitate the
correlation and analysis of your data.
The organization maintains documentation of interfaces and other connections between data system and the data transmission methods used in the interfaces.
The documentation concerning the interfaces shall be reviewed regularly and after significant changes to data systems.
Normal network traffic is described and the description maintained to detect anomalies. The description should be updated:
Organization must describe the baseline of normal behaviour for the use of network and data systems, which is used as a starting point for identifying anomalies.
When defining the baseline, the following must be taken into account:
Monitoring systems must be configured against the baseline to identify anomalous behavior such as:
System logs often contain a wealth of information, much of which is irrelevant to security monitoring. In order to identify events relevant to security monitoring, consideration should be given to automatically copying appropriate message types to another log or to using appropriate utilities or audit tools to review and resolve files.