PR.PS-04.252

Has your organization configured log generators to capture the data required for zero-trust architecture implementation?

Explanation

Zero-trust architectures require comprehensive logging of authentication attempts, access requests, network traffic, and system activities to verify user identities and enforce least-privilege access continuously. This includes configuring logs to capture user context (identity, device, location), resource access attempts, authentication events, and anomalous behaviors that might indicate security incidents. Evidence could include documentation of logging configurations across systems, sample logs showing the capture of zero-trust relevant data points, or configuration files for log generators that demonstrate the collection of identity, device, network, and access information required for zero-trust decision-making.

Implementation Example

Configure log generators to record the data needed by zero-trust architectures

ID: PR.PS-04.252

Context

Function
PR: PROTECT
Category
PR.PS: Platform Security
Sub-Category
Log records are generated and made available for continuous monitoring

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron