Monitoring Operational Audit Logs

The files written by your system(s) containing details of the changes made to your records, and to your operational environment, require close monitoring. Please refer also to Monitoring Error Logs.

To view the related Policy click      

  • Audit Logs may be inoperative or 'de-selected', in order to conceal present or future unauthorised systems activities.

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

  • Accidental loss of Audit Logs removes your audit trail, and hence the possible inability to determine the source of a problem.

There is 1 Key Action providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page