skip to content
 
 

What is GPG 13 compliance?

The Good Practice Guide 13 (GPG 13) is a framework with 12 protective monitoring controls (PMCs) for all His Majesty's Government (HMG) organizations. It is defined by the Communications-Electronics Security Group , Britain’s information assurance authority. When it comes to user access to networks and systems, GPG 13 requires organizations to record:

  • Unauthorized application access.
  • File access attempts to sensitive information.
  • Successful logins and logouts.
  • Unsuccessful logins and logouts.
  • Privileged system changes (e.g., account management, policy changes, device configuration).
  • Logs for at least six months.

How can you comply with GPG 13?

Compliance with GPG 13 is crucial for organizations dealing with sensitive data and connected to government networks. It helps protect privacy, prevent data breaches, and enhance overall cybersecurity. To comply with GPG 13, you need to implement all 12 PMCs. While adhering to GPG13 may be difficult for organizations facing constraints such as limited resources or small IT security teams, it is necessary to ensure the security and integrity of critical systems and sensitive information.

Who is expected to follow GPG 13?

Although the regulatory directives of GPG 13 primarily target HMG departments and agencies, service providers may also be obligated to adhere to it. Service providers that have access to government data are also expected to meet GPG 13's stipulated obligations.

Related content

Discover the simplified approach to GPG 13 compliance with EventLog Analyzer

Log management

Log management

EventLog Analyzer is a log monitoring solution that collects logs from various log sources present in your network environment, like Windows systems, Unix/Linux systems, applications, databases, firewalls, routers, switches, and IDS/IPS. The solution also monitors Windows devices, workstations, servers, and operating systems to conduct in-depth auditing and generate reports that can help you comprehend security logs . This feature will help you record logs from all network connections, which helps you meet PMC 6.

File integrity monitoring

File integrity monitoring

File integrity monitoring secures your organization's data from unauthorized and unwanted modifications, security threats, and breaches. It keeps track of any changes made to files or folders in real time to detect any security incidents quickly and generate alerts to the relevant stakeholder , who can then review the issue and take the necessary steps to resolve it. You can also keep tabs on changes to security privileges, such as permissions, ownership, and others, with the FIM module to comply with PMC 4.

User session monitoring

User session monitoring

It's important to monitor user activity, as threats can come from internal or external users. EventLog Analyzer's user session monitoring feature helps detect any data misuse by monitoring user activity on the network. It tracks your users' real-time activities and also provides exhaustive reports of all user activities, like user logons, user logoffs, failed logons, or user account changes, that took place after the user logged in. This feature facilitates the recording of user and workstation session activities (PMC 7), as well as detecting suspicious internal network activities (PMC 5).

Incident response

Incident response

EventLog Analyzer offers a real-time alerts feature with 500 predefined alert criteria or the option of building custom alert profiles tailored to your specific needs. You organization can be alerted of any suspicious event with notifications via email or SMS, helping you meet PMC 9.

Along with real-time alerts, EventLog Analyzer's automated incident response takes the necessary steps to reduce the impact of the attack right after a security incident, before the alerted security personnel takes a closer look. The incident response module has multiple built-in workflows, allowing organizations to save a great deal of time responding to incidents while also minimizing or eliminating potential damage.

How does EventLog Analyzer meet GPG 13 requirements?

Requirement How EventLog Analyzer helps with compliance EventLog Analyzer reports/features
PMC 1
Accurate time stamp
Prevents anyone from tampering with log timestamps. S ecure log storage.
PMC 2
Recording of business traffic crossing a boundary
Records traffic that passes through IIS and Apache web servers in the PMC 2 reports.
  • Apache Client Errors
  • Apache Server Errors
  • Apache HTTP Internal Server Error
  • Apache HTTP Forbidden
  • Apache HTTP Server Not Found
  • IIS Client Errors
  • IIS Server Errors
  • IIS Password Change
  • IIS Failed User Authentication
  • IIS HTTP Bad Request
  • IIS Site Access Denied
PMC 3
Recording of suspicious activity at the boundary
Displays all connections that have been denied and possible attacks on network perimeter devices in the PMC 3 reports.
  • Website Traffic
  • Denied Connections
  • AWS Failed Access Requests
  • All AWS Access Requests
PMC 4
Recording of internal workstation, server, or device status
Detects and records any suspicious activity, including configuration changes, privileged access, unexpected system and application restarts, software installation, removable media insertion and removal, and sensitive file access.
  • AWS Accessed Files
  • AWS Deleted Files
  • AWS Created Or Modified Files
  • Command Executed
  • Command Failed
  • Modified Buckets
  • Deleted Buckets
  • AWS Failed Events
PMC 5
Recording of suspicious internal network activity
Records policy changes and helps identify if an inside user is carrying out malicious activity.
  • Successful Logons
  • Failed Logons
  • Logoff Events
  • Successful VPN Logons
  • Failed VPN Logons
  • Audit Policy Changes
  • User Rights Assigned
  • User Rights Removed
  • Trusted Domain Created
  • Trusted Domain Modified
PMC 6
Recording of network connections
Records all Windows, Unix, and network perimeter device logons.
  • Windows Successful User Logons
  • Network Logon
  • Windows Successful User Logoffs
  • Network Logoff
  • Windows Unsuccessful User Logons
  • User Logons
  • User Logoffs
  • Unix Unsuccessful User Logons
PMC 7
Recording of session activity of users and workstations
Tracks entire user sessions from logon to logoff, including details of their activity during the session.
  • Failed Events By User
  • Update Events By User
  • Delete Events By User
  • Create Events By User
PMC 8
Recording of data backup status
Records failed backups and restoration events.
  • Successful Windows Backup
  • Failed Windows Backup
  • Successful Windows Restore
  • Failed Windows Restores
PMC 9
Alerting when critical events occur
Sends real-time alerts via email and SMS when any anomalous activity happens in the network. A program can be assigned to run when an alert is generated. The incident response and management console alerts the users when critical events occur.
PMC 10
Reporting on the status of the audit system
Tracks the clearing of all security logs and event logs.
  • Event Logs Cleared
  • Security Logs Cleared
PMC 11
Production of sanitized and statistical management reports
Offers a highly customizable reporting function. Admins can configure existing reports to suit their specific requirements or create new ones. All predefined reports can be customized and scheduled.
PMC 12
Providing a legal framework for protective monitoring activities
Ensures that all data is collected and analyzed for forensic validity. Centrally collects, archives, searches, analyzes, and correlates machine-generated logs obtained from heterogeneous systems, network devices, and applications and generates forensic reports.

Related solutions offered by EventLog Analyzer:

Privileged user monitoring

Track privileged user accounts and detect any suspicious events like unauthorized logons, logon failures, user account changes, user group changes, audit logs cleared, audit policy changes, and access attempts during non-working hours. EventLog Analyzer also provides reports that help to identify user behavior that may indicate privilege abuse.

Learn more

Log archiving

With help of EventLog Analyzer, archive all collected logs and automatically store them securely after the retention period is complete. By configuring the retention period details in EventLog Analyzer, you can adhere to GPG 13, which requires logs to be retained for at least six months.

Learn more

Log forensic analysis

EventLog Analyzer's forensic analysis feature provides organizations with the capabilities necessary to conduct in-depth investigations into security incidents and identify root causes.

Learn more

Application auditing

Audit all your critical application servers like Apache, IIS, SQL, and other custom applications. The tool collects, analyzes, and correlates any application logs and provides actionable insights about network events.

Learn more

Seamlessly achieve GPG 13 compliance with EventLog Analyzer

Download

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management