3½-page policy on audit and security logging.
Audit trails, security logs and other records of key transactions and activities are an important element of the controls framework, particularly for automated IT systems. The security and other requirements must be determined and satisfied in order for them to have any value as controls.
Delivered as an editable MS Word document, easily customized for your organization's specific needs.
Audit and security logging policy
Template policy on auditing & security logs
See also the policies on:
- Information systems
- IT systems development and acquisition
- IT auditing