To verify conformity to control 8.15 Logging of ISO/IEC 27001 Annex A, the audit team verified a sample of server logs to determine if they can be edited or deleted. Which audit procedure was used?
The audit procedure used here is 'analysis.' The audit team analyzed server logs to verify if they can be edited or deleted, focusing on evaluating the logs' properties and the controls over their manipulation to ensure they comply with ISO/IEC 27001 requirements.
Viola
2 months agoLizbeth
2 months agoClorinda
1 months agoJustine
1 months agoStacey
1 months agoLeeann
2 months agoKrissy
2 months agoBeth
3 months agoVicky
3 months agoDannie
1 months agoEliseo
1 months agoSkye
1 months agoViola
2 months agoDell
2 months agoCarmela
2 months agoMillie
2 months agoAudrie
3 months agoDulce
3 months agoLoreta
2 months agoSharita
2 months agoEun
3 months agoDelsie
3 months ago