Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Cybersecurity Deployment Guide - Security Concepts

Audit and log

  • Last UpdatedFeb 25, 2025
  • 1 minute read

As part of implementing security for ICS software, it is important to incorporate auditing and logging activities on various systems and networks.

Auditing and logging provide information on the current state of your ICS and help to ensure that the system is functioning as expected. If an incident occurs, you can use the activity logs to trace the origin of the incident to a computer, user, or network. Auditing and logging can also help with troubleshooting issues.

If you are connecting to cloud-based solutions, audit all virtual machines (VMs) to ensure data integrity.

TitleResults for “How to create a CRG?”Also Available in