SEFELEC1500M Instructions 131 V1.0614.1.7. LOGGING AND EVENTS MANAGEMENT- EATON recommends logging all falling within system and application events, including all ad-ministrative and maintenance activities.- Logs should be protected from tampering and other risks to their integrity (for example,by restricting permissions to access and modify logs, transmitting logs to a security informationand event management system, etc.).- Ensure that logs are retained for a reasonable and appropriate length of time.- Review the logs regularly. The frequency of review should be reasonable, taking intoaccount the sensitivity and criticality of the System | Device and any data it processes14.1.8. MALWARE DEFENCES:EATON recommends deploying adequate malware defences to protect the product or the plat-forms used to run the EATON product.14.1.9. SECURE MAINTENANCE:Best PracticesUpdate device firmware prior to putting the device into production. Thereafter, apply firmwareupdates and software patches regularly.EATON publishes patches and updates for its products to protect them against vulnerabilitiesthat are discovered. EATON encourages customers to maintain a consistent process to promptlymonitor for and install new firmware updates.Please check EATON’s cybersecurity website for information bulletins about available firmwareand software updates