7.6: Log All URL Requests

Log all URL requests from each of the organization’s systems, whether on-site or a mobile device, in order to identify potentially malicious activity and assist incident handlers with identifying potentially compromised systems.

Asset Type

Security Function

Implementation Groups

Network

Detect

2, 3

Dependencies

  • Sub-control 1.5: Maintain Asset Inventory Information

  • Sub-control 5.1: Establish Secure Configurations

Inputs

  1. The list of endpoints

  2. The organization’s logging configuration policy, detailing URL logging configuration

Operations

  1. For each endpoint, collect the system logging configuration

Measures

  • M1(i) = (For each endpoint “i”) 1 if the endpoint’s logging configuration complies with the organizations logging policy; 0 otherwise.

  • M2 = Count of endpoints from Input 1

Metrics

Configuration Coverage

Metric

The ratio of devices which enable URL request logging to the total number of devices.

Calculation

(SUM from i=1..M2 (M1(i))) / M2