Security News > 2023 > July > Auditing and Logging Policy
Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various activities.
These activities include network traffic, internet access, creating or deleting users, adding users to groups, changing file permissions, transferring files, opening the case, powering off, deleting system logs, and anything else a user, administrator or the system itself might do.
This policy from TechRepublic Premium provides guidelines for the appropriate use of auditing and logging in computer systems, networks and other devices that store or transport critical and/or security-sensitive data.
It is recommended that automated monitoring controls be established to ensure auditing and logging work as outlined in this policy and to alert of any attempts to tamper with the related settings or functions.
Resource Details Download for $29 or Access all downloads for $299/yr*.
Download for $29 or Access all downloads for $299/yr*.
News URL
https://www.techrepublic.com/resource-library/whitepapers/auditing-and-logging-policy/