This section focuses on best practices to ensure that logs produced by information systems are stored in accordance with the organization’s retention policy and checked regularly for evidence of malicious or unusual activity.
This section focuses on best practices to ensure that logs produced by information systems are stored in accordance with the organization’s retention policy and checked regularly for evidence of malicious or unusual activity.