Inadequate information security incident or event response

Control

Maintain a detailed log of each security event/incident, including resolution