To verify conformity to control 8.15 Logging of ISO/IEC 27001 Annex A, the audit team verified a sample of server logs to determine if they can be edited or deleted. Which audit procedure was used?
The audit procedure used here is 'analysis.' The audit team analyzed server logs to verify if they can be edited or deleted, focusing on evaluating the logs' properties and the controls over their manipulation to ensure they comply with ISO/IEC 27001 requirements.
Viola
15 days agoLizbeth
17 days agoLeeann
19 days agoKrissy
22 days agoBeth
24 days agoVicky
25 days agoDell
7 days agoCarmela
13 days agoMillie
21 days agoAudrie
27 days agoDulce
1 months agoLoreta
16 days agoSharita
20 days agoEun
27 days agoDelsie
28 days ago