Monitoring & Detection · MD-Q02

Question: Are logs and telemetry from critical sources (identity, endpoint, network, cloud, apps) centralized and time-synced?

Why This Matters

Centralization and consistent time make investigations possible. Without it, correlations break and attackers hide in the gaps.

Maturity

0 — Unaware
Logs remain on devices; no central access.
1 — Ad Hoc
Some sources forward logs; time not synchronized.
2 — Defined
Core sources (IdP, EDR, VPN, firewalls) forward to a central store.
3 — Managed
NTP enforced; ingest health monitored; parsing/normalization applied.
4 — Integrated
Unified schema; deduplication and enrichment (GeoIP, user/device context).
5 — Optimized
Tiered storage and routing by value; automated backlog/ingest recovery.

How to Level Up

From → To Actions
0 → 1 Enable syslog/Event Forwarding; configure NTP everywhere.
1 → 2 Onboard IdP, EDR, VPN, firewalls; verify receipt.
2 → 3 Normalize key fields; monitor ingest lag and failures.
3 → 4 Add enrichment (host, user, GeoIP); apply field standards.
4 → 5 Implement hot/warm/cold tiers and replay pipelines.

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

Purpose Tool Notes
Forwarders Fluent Bit / Winlogbeat Lightweight agents.
Lake Loki / OpenSearch Cost-efficient centralization.
NTP Chrony Reliable time sync.

Common Pitfalls

Compliance Mapping

Standard Clauses / Notes
ISO/IEC 27001:2022 A.8.16
CERT-In 2022 Security Monitoring & Logs
DPDP Act 2023 Sec 9, Sec 10
NIST CSF 2.0 DE.CM / PR.DS-06
NIRMATA Mapping MD-Q02 anchors centralization and time integrity.