132
InformatIon SecurIty PolIcy DeveloPment for comPlIance
10.5.4 Write logs for external-facing technologies onto a log
server on the internal LAN.
10.5.5 Use le-integrity monitoring or change-detection
software on logs to ensure that existing log data cannot be
changed without generating alerts (although new data being
added should not cause an alert).
10.6
Revi
ew logs for all system components at least daily. Log reviews
must include those servers that perform security functions like
intrusion-detection system (IDS) and authentication, authorization,
and accounting (AAA) protocol servers (for example, RADIUS).
Note: Log harvesting, parsing, and alerting tools may be used to meet
comp
liance with Requirement ...