IDEF Security Logs, v1.0

Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement SECURE-14: SECURITY LOGS.

Assessment Steps (2)

1
Transaction and Security Event Logs (TransactionandSecurityEventLogs)
Does the entity log its transactions and security events in a manner that supports system audits and, where necessary, security investigations and regulatory requirements?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) and supporting notes as appropriate to support the assessor's response to this assessment step.
2
Appropriate Timestmp Synchronization and Log Detail (AppropriateTimestmpSynchronizationandLogDetail)
Does the entity implement timestamp synchronization and detail of logs in a manner that is appropriate to the level of risk associated with the environment and transactions?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) and supporting notes as appropriate to support the assessor's response to this assessment step.

Conformance Criteria (1)

Security Logs
Entities conducting digital identity management functions MUST log their transactions and security events, in a manner that supports system audits and, where necessary, security investigations and regulatory requirements. Timestamp synchronization and detail of logs MUST be appropriate to the level of risk associated with the environment and transactions.
Citation
IDEF
Page 37