To verify conformity to control 8.15 Logging of ISO/IEC 27001 Annex A, the audit team verified a sample of server logs to determine if they can be edited or deleted. Which audit procedure was used?
The audit procedure used here is 'analysis.' The audit team analyzed server logs to verify if they can be edited or deleted, focusing on evaluating the logs' properties and the controls over their manipulation to ensure they comply with ISO/IEC 27001 requirements.
Jessenia
5 months agoStarr
5 months agoChery
5 months agoFelicidad
6 months agoOllie
6 months agoTheodora
6 months agoDevora
6 months agoJaime
6 months agoBethanie
7 months agoHortencia
7 months agoAlfreda
7 months agoBlondell
7 months agoRocco
7 months agoJodi
7 months agoViola
2 years agoLizbeth
2 years agoClorinda
1 year agoJustine
1 year agoStacey
2 years agoLeeann
2 years agoKrissy
2 years agoBeth
2 years agoVicky
2 years agoDannie
1 year agoEliseo
1 year agoSkye
1 year agoViola
2 years agoDell
2 years agoCarmela
2 years agoMillie
2 years agoAudrie
2 years agoDulce
2 years agoLoreta
2 years agoSharita
2 years agoEun
2 years agoDelsie
2 years ago