@@ -866,7 +866,9 @@ Distributed application design and delay lines built with buffers might tolerate
### 5.3.5 Logging
The monitoring requirements becomes more demanding, when the security expectation of the deployment context is more strict.
In many product deployments, administrators manage monitoring tasks also with the analysis of product logging records.
Especially when there are forensic demands, comprehensive and detailed logging becomes a larger challenge.
The logging requirements in this subclause define baseline event recording and additional protections for retention, integrity, backup, and external forwarding according to the applicable risk tier.
When evaluating the applicability of these requirements, the highest of following risk factors define the category to follow: [NIS2]