NIST 800-53 REV 5 • SYSTEM AND INFORMATION INTEGRITY
SI-4(8) — Protection of Monitoring Information
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
Protect the integrity and availability of your monitoring information — if an attacker can delete or alter your logs, they can cover their tracks.
Example 1: Send logs to a write-once storage location (WORM storage or immutable blob storage in Azure) where they cannot be modified or deleted, even by administrators. This ensures forensic evidence is preserved.
Example 2: Configure your SIEM to alert if log collection stops from any source. If a server suddenly stops sending logs, it could mean the server is down — or it could mean an attacker disabled logging. Either way, you need to investigate immediately.