© 2019 IsecT Limited, New Zealand      Get in touch

3½-page policy on audit and security logging.

 

Audit trails, security logs and other records of key transactions and activities are an important element of the controls framework, particularly for automated IT systems.  The security and other requirements must be determined and satisfied in order for them to have any value as controls.

 

Delivered as an editable MS Word document, easily customized for your organization's specific needs.

Audit and security logging policy

$15.00Price
  • Template policy on auditing & security logs

     

    See also the policies on:

    • Information systems
    • IT systems development and acquisition
    • IT auditing

Content