Skip to main content

CCC.AuditLog.C01: Implement Digital Signatures With Hash Chaining

Control ID:CCC.AuditLog.C01
Title:Implement Digital Signatures With Hash Chaining
Objective:Digital signatures allows for external verification of log data tampering and hash chaining allows for deleted log files to be detected.
Control Family:
Integrity

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.Core.TH06Data is Lost or CorruptedServices that rely on accurate data are susceptible to disruption in the event of data loss or corruption. Any actions that lead to the unintended deletion, alteration, or limited access to data can impact the availability of the service and the system it is part of.
1
1
0
CCC.Core.TH07Logs are Tampered With or DeletedTampering or deletion of service logs will reduce the system's ability to maintain an accurate record of events. Any actions that compromise the integrity of logs could disrupt system availability by disrupting monitoring, hindering forensic investigations, and reducing the accuracy of audit trails.
1
1
0

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.DS-01
0
-
NIST_800_53
AU-9
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.AuditLog.C01.TR01When the signature validation process is performed, then it MUST detect any modification of data.
tlp-red
CCC.AuditLog.C01.TR02When the signature validation process is performed, then it MUST detect any missing (deleted) log file.
tlp-red