-

Logging and Monitoring

This topic contains the following sections:

Log and status data as feedback for security improvements

The early detection of security-relevant incidents as well of system errors and performance "bottlenecks" during operation or data transmission depends to a large extent on adequate logging and monitoring.
In particular, log data and status information from the various areas, zones (processes) and conduits of your plant provide important information for all activities relating to security. They form the basis for decisions regarding the status of protection or necessary adjustments or extensions to security measures and policies.

A central function should consolidate and evaluate log data and status information from the entire plant. The results of this evaluation should be incorporated into the permanent risk management system so that a changing threat situation can be identified as quickly as possible and appropriate countermeasures initiated.

The evaluation of the log files and status information should be performed at regular intervals. A corresponding message/report should be generated as soon as a previously defined threshold value for a specific event is exceeded.

Logging: Recording of events

The following list shows the events that should be logged.

Note
All logged events should be reported to suitable recipients which evaluate and further process this notification.

Note
Logging must comply with the applicable data protection guidelines.

Each log entry should be composed of the following information:

Monitoring the system state