Skip to main content

CCC.Logging.C06: Detect and Alert on Potential Log Exfiltration

Control ID:CCC.Logging.C06
Title:Detect and Alert on Potential Log Exfiltration
Objective:Identify and alert on anomalous data access patterns that may indicate an attempt to exfiltrate log data.
Control Family:
Logging and Monitoring

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.Logging.TH02Unauthorized Data Transfer Out of a Trusted BoundarySensitive log data, including PII, financial transaction details, or system vulnerabilities, is exfiltrated directly from the logging service's query or API interfaces by authorized but malicious insiders or compromised accounts exploiting legitimate access.
1
2
0

Related Capabilities

IDTitleDescription
CCC.Core.F06Access ControlThe service automatically enforces user configurations to restrict or allow access to a specific component or a child resource based on factors such as user identities, roles, groups, or attributes.
CCC.Core.F14API AccessThe service exposes a port enabling external actors to interact programmatically with the service and its resources using HTTP protocol methods such as GET, POST, PUT, and DELETE.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
DE.CM-03
0
-
NIST-CSF
DE.CM-09
0
-
NIST_800_53
SI-4
0
-
NIST_800_53
CA-7
0
-
NIST_800_53
AU-6
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.Logging.C06.TR01When a single principal executes an anomalously high number of log queries, an alert MUST be generated.
tlp-green
tlp-amber
tlp-red