Section 8.2.2 Top Level Logging and Intrusion Detection Sub Level 8.2 What to Log General Log all security-critical events.