Skip to main content
← All controls
AU-9 / AU-11 / IR-4(1) / A.12.4.1 / CIS-8.3 NIST SP 800-53 Rev 5

Forensic readiness — logs + tools

Demonstrate that the organization maintains comprehensive, protected logs with adequate retention and has deployed forensic tools and procedures to support timely and legally defensible incident investigations.

Description

What this control does

Forensic readiness for logs and tools ensures that an organization maintains comprehensive, tamper-evident logs and has pre-deployed forensic analysis capabilities to support incident investigation. This control requires centralized log aggregation with adequate retention periods, synchronized time sources, write-once or immutable storage for critical logs, and availability of forensic toolkits (disk imaging, memory capture, network packet analysis) with trained personnel. Effective forensic readiness reduces mean time to investigation (MTTI), preserves evidence integrity for legal proceedings, and enables accurate root-cause analysis after security incidents.

Control objective

What auditing this proves

Demonstrate that the organization maintains comprehensive, protected logs with adequate retention and has deployed forensic tools and procedures to support timely and legally defensible incident investigations.

Associated risks

Risks this control addresses

  • Attackers delete or modify logs to conceal intrusion activities, resulting in inability to determine scope or method of compromise
  • Insufficient log retention periods cause critical evidence to be overwritten before investigations commence, preventing root-cause determination
  • Lack of time synchronization across systems prevents accurate correlation of events during multi-stage attacks spanning multiple assets
  • Absence of pre-deployed forensic tools forces responders to install analysis software on compromised systems, contaminating evidence and alerting adversaries
  • Inadequate logging scope omits security-relevant events (authentication failures, privilege escalations, configuration changes), leaving investigative blind spots
  • Evidence integrity cannot be proven due to missing chain-of-custody procedures or lack of cryptographic log protection, rendering findings inadmissible in legal proceedings
  • Insufficient storage allocation for logs causes premature rotation or logging failures during high-volume security events when visibility is most critical

Testing procedure

How an auditor verifies this control

  1. Obtain and review the organization's log retention policy, forensic readiness procedure, and inventory of systems generating security-relevant logs.
  2. Select a representative sample of 8-12 critical systems (domain controllers, firewalls, databases, privileged access workstations) and verify each forwards logs to the centralized SIEM or log repository.
  3. Review the log source configurations to confirm security-relevant events are captured including authentication events, privileged actions, configuration changes, network connections, and file access on sensitive systems.
  4. Verify time synchronization by comparing timestamps across at least five geographically or logically separated systems against an authoritative NTP source, confirming drift is within acceptable tolerance (typically <1 second).
  5. Examine log storage configuration to verify write-once, append-only, or cryptographic signing mechanisms prevent tampering, and confirm retention periods meet policy requirements (minimum 90 days for most compliance frameworks, 1+ year for critical systems).
  6. Request demonstration of forensic tool availability by identifying the location and accessibility of disk imaging software, memory capture tools, network packet analyzers, and malware analysis sandboxes, including verification of current licenses and tool versions.
  7. Review access controls on forensic tools and log repositories to confirm only authorized incident response personnel have access, and that privileged access is logged and monitored.
  8. Test forensic readiness by requesting retrieval of logs from a specific date 60+ days prior for a sampled system, verifying the logs are complete, readable, and include all expected event categories with intact timestamps and source attribution.
Evidence required Configuration exports from SIEM/log aggregator showing sources, retention settings, and storage protection mechanisms; screenshots of NTP configuration and time drift reports; forensic tool inventory with version numbers, license status, and access control lists; sample log extracts demonstrating event coverage and timestamp accuracy; log retention policy document with approved retention periods; chain-of-custody template or procedure for evidence handling.
Pass criteria All sampled systems forward complete security logs to protected centralized storage with verified retention meeting policy minimums, time synchronization drift is within tolerance across systems, forensic tools are accessible with current licenses and documented procedures, and historical log retrieval demonstrates integrity and completeness.

Where this control is tested

Audit programs including this control