Awareness
Regulations & Standards
US Regulations & Standards
International Regulations & Standards
Threats & Readiness
Cyber Announcements
Latest Vulnerabilities, Exploits, & Remediation
Cybersecurity Compliance and Risk Assessment
Readiness
Cloud Security
Implementation & Assessment
Guides, Standards, Tools & Resources
Top 10 High Value Controls
Access Controls
Assets Management
Boundary and Communications Defense
Data Protection
Incident Response and Management
Log Management
Secure Configurations and Change Management
Security Plans & Assessments
Training & Awareness
Vulnerability & Risk Management
CMMC
CMMC Home
CMMC Training
By Level
By Domain
Additional Resources
About CyberAssist
Contact
DIB SCC
Search
Select Page
Proofpoint – The Importance of Enterprise Scale for User Activity Monitoring
logz.io – Using Audit Logs for Security and Compliance
Microsoft – Basic Security Audit Policy Settings
CSO – Why you need Centralized logging and event log management
Environmental Protection Agency – Audit and Accountability Procedure
log.io – The Complete Guide to the ELK Stack
Open Web Application Security Project (OWASP) – Logging Cheat Sheet OWASP
NIST SP 800-53: SI-4 Information System Monitoring
How to Stay HIPAA Compliant with Audit Logs
Microsoft – Search the audit log in the compliance portal