This rule ensures database logging is enabled to maintain data security.
Rule | Database logging should be enabled |
Framework | CISA-cyber-essentials |
Severity | ✔ Low |
Rule Description:
The rule requires enabling database logging for CISA Cyber Essentials. Enabling database logging helps in tracking and recording valuable information about activities and events occurring within the CISA Cyber Essentials database. It enhances security by providing an audit trail, facilitating troubleshooting, and aiding in the detection of any malicious activities.
Troubleshooting Steps:
If database logging is not enabled for CISA Cyber Essentials, follow these troubleshooting steps:
Verify the Database Logging Settings:
Enable Database Logging:
Test Logging:
Verify Log Retention Policy:
Collaborate with IT and Security Teams:
Necessary Codes:
No specific codes are provided as part of this rule. The steps involve configuration within the CISA Cyber Essentials software, which typically provides a graphical user interface (GUI) for enabling database logging and selecting appropriate settings.
Step-by-Step Guide for Remediation:
Follow these steps to enable database logging for CISA Cyber Essentials:
Login to the CISA Cyber Essentials software with administrative credentials.
Navigate to the settings or configuration section.
Look for the option related to logging and click on it.
Check if the database logging option is available and configurable.
If available, enable the database logging feature.
Set the appropriate logging level based on the required level of detail (e.g., low, medium, high) and compliance requirements.
Configure the destination database where the logs will be stored. Specify the server details, database name, and authentication credentials if required.
Save the changes and exit the settings or configuration section.
Perform a test action within the CISA Cyber Essentials software to generate activity.
Verify if the logging is capturing the expected events.
Access the configured database to review the logs and ensure that the logged information aligns with the expected outcome.
If necessary, adjust the log retention policy to retain logs for a sufficient period.
Collaborate with the IT and security teams to ensure the proper configuration and monitoring of the database logging solution.
Note: The exact steps may vary depending on the interface and configuration options provided by the CISA Cyber Essentials software. Implementers should refer to the software documentation or consult with the vendor for specific instructions.