Safeguard 8.5: Collect Detailed Audit Logs
Safeguard 8.5 requires you to collect detailed audit logs from key systems and services so security and compliance teams can reconstruct events, detect abuse, and support investigations. To operationalize it fast, define a log standard, turn on the right event sources, centralize collection, protect integrity, and prove coverage with repeatable evidence. 1
Key takeaways:
- Treat 8.5 as an engineering deliverable: defined log schema + enabled sources + centralized pipeline + protected retention. 2
- “Detailed” means logs that can answer who/what/when/where/how across identity, endpoints, servers, network, and critical applications. 3
- Your biggest audit risk is not missing logs, it’s missing proof that logging is configured, complete for scope, and routinely reviewed. 1
Safeguard 8.5: collect detailed audit logs requirement work fails in predictable ways: logs exist but are incomplete, scattered across tools, overwritten too quickly, or impossible to correlate to a user and an asset. CIS expects you to collect audit logs with enough detail to support detection and investigation, not just “have logging somewhere.” 1
For a Compliance Officer, CCO, or GRC lead, the fastest path is to convert 8.5 into a small set of testable statements: (1) which systems are in scope, (2) which events must be logged, (3) where logs go, (4) how they’re protected, and (5) what evidence proves the control runs. That framing lets you coordinate Security, IT, and application owners without turning this into an open-ended SIEM project.
This page gives requirement-level implementation guidance you can hand to operators. It prioritizes coverage decisions, minimum viable log content, evidence that survives audits, and common failure modes seen in assessments aligned to CIS Controls v8. 2
Regulatory text
Framework requirement: “CIS Controls v8 safeguard 8.5 implementation expectation (Collect Detailed Audit Logs).” 1
Operator interpretation of the text: You must (a) identify the systems where audit logs matter, (b) enable detailed logging at the source, and (c) collect those logs centrally so they can be searched, correlated, and preserved as evidence. “Collect” is the verb that drives implementation: local logs that never leave a host do not meet the operational intent if they can be lost, altered, or inaccessible during an incident. 2
Plain-English interpretation (what “detailed audit logs” means in practice)
You meet safeguard 8.5 when your organization can reliably answer investigation questions using logs:
- Who did it: user identity, service account, API client, source authentication context.
- What happened: action taken (create/delete/update), command executed, policy changed, permission granted.
- When it happened: time synchronized, consistent timestamps, timezone clarity.
- Where it came from: hostname, instance ID, IP, device ID, application tenant.
- How it happened: protocol, authentication method, elevated privilege path, MFA status (if available).
Detailed does not require logging every byte of telemetry. It requires logging the security-relevant events that let you reconstruct activity on critical assets and detect misuse. 1
Who it applies to
Entity types: Enterprises and technology organizations adopting CIS Controls v8 as a security baseline or mapping CIS to other obligations. 1
Operational contexts where 8.5 becomes audit-critical:
- Regulated environments where logs support incident response, access governance, and investigations.
- Cloud-first environments where “the system” includes identity providers, SaaS admin consoles, and cloud control planes.
- High third-party dependence where key business processes run in third-party platforms and you need their audit trails (or compensating controls).
Control owners (typical):
- Security Engineering / Detection & Response (collection pipeline and content standards)
- IT Operations / Platform teams (endpoint/server/cloud configurations)
- Application owners (app-level audit events)
- GRC (scope definition, evidence, exceptions)
What you actually need to do (step-by-step)
Use this sequence to operationalize quickly and avoid scope creep.
1) Set scope: “what must produce detailed audit logs”
Create a scoped inventory of log-producing sources tied to business risk:
- Identity systems (SSO/IdP), directory services
- Privileged access systems (PAM), admin consoles
- Endpoints and servers (including jump hosts)
- Network/security controls (firewalls, VPN, proxies, EDR/NDR)
- Critical applications (customer data, payments, HR, code repos)
- Cloud control plane services (management events)
Output artifact: “Audit Log Source Register” with owner, system, data sensitivity, and logging method.
2) Define a minimum log content standard (your “detailed” definition)
Write a short standard that each source must satisfy. Keep it testable. Example fields:
- Timestamp (with timezone), event ID/type, result (success/fail)
- Actor (user/service account), target resource, action
- Source device/system identifiers (hostname, instance ID), source IP
- Privilege context (admin role, sudo/elevation, policy used) where applicable
Output artifact: “Audit Logging Standard” mapped to your register.
3) Turn on the right event categories at the source
For each source, document and enable security-relevant event types. Common categories:
- Authentication events (login, logout, MFA challenges, failures)
- Authorization/privilege events (role changes, group membership, access grants)
- Administrative changes (policy edits, configuration changes, key management events)
- Data access events for critical data stores where feasible (reads/writes/deletes)
- Security tool events (alerts, agent status, tamper attempts)
Practical check: If an incident responder asked “How did they get admin?” you should have events that show the privilege path.
4) Centralize collection into a searchable platform
Decide your collection architecture:
- SIEM, log analytics platform, or centralized log store
- Agents vs agentless collection
- Parsing/normalization plan (even partial normalization helps investigations)
Set acceptance criteria:
- Each source in the register forwards logs successfully.
- Logs are queryable by user, hostname, IP, and event type.
- Collection failures generate alerts/tickets (you need to know when you’re blind).
5) Protect integrity and access to logs
Detailed logs become sensitive fast. Add controls that make logs usable as evidence:
- Restrict access (role-based access; least privilege)
- Separate duties (admins of production systems should not be able to edit/delete central logs without detection)
- Protect retention storage from tampering (write-once controls if available; immutable storage options if your platform supports it)
- Ensure time synchronization across systems so timelines make sense
6) Operationalize: review, tune, and prove
You need recurring operations, not a one-time enablement:
- Monitor ingestion health (missing sources, drop spikes)
- Validate parsing for key sources (identity, endpoints, cloud admin)
- Run periodic “investigation drills” using logs (sample a user, trace activity across systems)
- Maintain exceptions with compensating controls where a system cannot produce certain logs
Daydream note (earned mention): Teams often lose time chasing screenshots across tools during audits. Daydream can track each 8.5 log source as an auditable control item, assign owners, and schedule recurring evidence capture so you always have current proof of collection and coverage. 2
Required evidence and artifacts to retain
Auditors and assessors want proof of design and operation. Keep both.
Design evidence (what you intended):
- Audit Logging Standard (what “detailed” means for your org)
- Audit Log Source Register (scope + ownership)
- Architecture diagram of log collection (high level is fine)
- Role-based access description for log platform (who can read, who can administer)
Operating evidence (what is happening):
- Configuration exports or settings screenshots showing detailed logging enabled for representative sources (identity, endpoints, cloud admin, critical app)
- Central platform proof: sample log queries that demonstrate required fields (user, source, event type, timestamp)
- Ingestion health reports or dashboards (show sources reporting)
- Tickets/alerts from collection failures and resolution notes
- Change records for logging configuration changes (who approved, what changed)
Exception handling:
- Exception register: system, missing capability, risk accepted, compensating control, expiration date, owner sign-off
Common exam/audit questions and hangups
Use these as your internal readiness checklist.
-
“Show me your list of systems that produce audit logs.”
Hangup: teams show tool lists, not system scope with ownership. -
“How do you define ‘detailed’?”
Hangup: vague policy language with no required fields or event categories. -
“Prove the logs are centralized and searchable.”
Hangup: local logs exist, but no centralized query evidence. -
“How do you know logging hasn’t stopped?”
Hangup: no monitoring for ingestion gaps or agent failures. -
“Who can delete or alter logs?”
Hangup: admins have broad permissions; no separation of duties. -
“Can you reconstruct an admin change?”
Hangup: missing identity/admin console events or poor time synchronization.
Frequent implementation mistakes (and how to avoid them)
| Mistake | Why it fails audits | Fix |
|---|---|---|
| Logging “on” without event selection | You collect noise but miss admin and auth events | Define event categories per source in the register |
| No ownership per log source | Breaks during re-orgs; nobody fixes ingestion failures | Assign a named system owner and a backup |
| Treating SaaS as out of scope | Critical actions occur in third-party consoles | Add SaaS admin audit logs to the register or document exception |
| Inconsistent timestamps | Correlation fails; timelines are unreliable | Enforce time sync and document timezone handling |
| Evidence is ad hoc | You scramble each audit cycle | Schedule recurring evidence capture and store artifacts centrally |
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this safeguard. 1
Risk still materializes operationally:
- Without detailed logs, incident response becomes guesswork and containment takes longer.
- Investigations stall when you cannot attribute actions to a user or system.
- You may fail customer security reviews that expect demonstrable logging coverage aligned to CIS.
A practical 30/60/90-day execution plan
First 30 days (stabilize scope and standards)
- Build the Audit Log Source Register for critical identity, endpoint/server, cloud admin, and top business apps.
- Publish the Audit Logging Standard (required fields + event categories).
- Identify the central collection platform and confirm it can ingest from the initial scope.
By 60 days (enable and centralize the high-value sources)
- Enable detailed logging for identity systems and privileged/admin activity sources first.
- Onboard the highest-risk endpoints/servers and cloud control plane logs.
- Implement access controls and admin role separation for the log platform.
- Stand up ingestion health monitoring and an escalation path to owners.
By 90 days (prove operations and close evidence gaps)
- Expand coverage to remaining critical applications and network/security controls.
- Run a tabletop-style log reconstruction exercise and retain outputs as operational evidence.
- Formalize exceptions with compensating controls and expiration dates.
- Put evidence collection on a recurring cadence in your GRC workflow (Daydream or your existing system) so audits become retrieval work, not rework. 2
Frequently Asked Questions
What counts as “detailed” for safeguard 8.5?
“Detailed” means logs include enough context to attribute actions and reconstruct events, typically who acted, what they did, when it happened, and where it originated. Define required fields and event categories in a written logging standard, then test against real log samples. 1
Do we need a SIEM to meet safeguard 8.5?
CIS focuses on collecting and being able to use the logs, not on a specific product. If your central log store supports secure collection and searchable retrieval, it can meet the intent; document how collection, access control, and retention work. 2
How do we handle SaaS and other third-party systems?
Add third-party platforms that host critical processes or data to your Audit Log Source Register and collect their admin/audit logs where available. If the third party cannot provide needed logs, document an exception and compensating monitoring or contractual requirements. 2
What evidence do auditors usually accept for “collecting” logs?
Auditors typically accept a combination of scope documentation, configuration proof that logging is enabled, and centralized platform evidence (queries or dashboards) showing logs arriving with required fields. Keep ingestion health records to show the control operates over time. 2
How do we avoid drowning in log volume?
Start with high-risk event categories (auth, privilege, admin changes) and critical systems, then expand. Use filtering and parsing rules intentionally, but don’t filter out the events you’ll need to explain administrative actions or access changes. 2
Who should own safeguard 8.5, Security or GRC?
Security and IT typically own technical implementation (sources, pipelines, platform access), while GRC owns scoping, exceptions, and evidence discipline. Assign explicit owners per log source so gaps don’t land in a shared inbox. 2
Footnotes
Frequently Asked Questions
What counts as “detailed” for safeguard 8.5?
“Detailed” means logs include enough context to attribute actions and reconstruct events, typically who acted, what they did, when it happened, and where it originated. Define required fields and event categories in a written logging standard, then test against real log samples. (Source: CIS Controls v8; CIS Controls Navigator v8)
Do we need a SIEM to meet safeguard 8.5?
CIS focuses on collecting and being able to use the logs, not on a specific product. If your central log store supports secure collection and searchable retrieval, it can meet the intent; document how collection, access control, and retention work. (Source: CIS Controls v8)
How do we handle SaaS and other third-party systems?
Add third-party platforms that host critical processes or data to your Audit Log Source Register and collect their admin/audit logs where available. If the third party cannot provide needed logs, document an exception and compensating monitoring or contractual requirements. (Source: CIS Controls v8)
What evidence do auditors usually accept for “collecting” logs?
Auditors typically accept a combination of scope documentation, configuration proof that logging is enabled, and centralized platform evidence (queries or dashboards) showing logs arriving with required fields. Keep ingestion health records to show the control operates over time. (Source: CIS Controls v8)
How do we avoid drowning in log volume?
Start with high-risk event categories (auth, privilege, admin changes) and critical systems, then expand. Use filtering and parsing rules intentionally, but don’t filter out the events you’ll need to explain administrative actions or access changes. (Source: CIS Controls v8)
Who should own safeguard 8.5, Security or GRC?
Security and IT typically own technical implementation (sources, pipelines, platform access), while GRC owns scoping, exceptions, and evidence discipline. Assign explicit owners per log source so gaps don’t land in a shared inbox. (Source: CIS Controls v8)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream