Audit and log
- Last UpdatedJul 19, 2024
- 1 minute read
As part of implementing security for ICS software, it is important to incorporate auditing and logging activities on various systems and networks.
Auditing and logging provide information on the current state of your ICS, and help to ensure that the system is functioning as expected. If an incident occurs, you can use the activity logs to trace the origin of the incident to a computer, user or network. Auditing and logging can also help with troubleshooting issues.
If you are connecting to cloud-based solutions, audit all virtual machines (VMs) to ensure data integrity.