Audit logs are crucial for monitoring and reviewing the activities within IT systems, especially those processing personal data. The lack of audit logs presents a significant IT-related risk as it undermines the ability to trace any unauthorized or inappropriate access and actions within the system, thereby impacting the integrity and security of data.
Best practices in IT security and internal control frameworks like COBIT and ISO/IEC 27001.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit