To verify conformity to control 8.15 Logging of ISO/IEC 27001 Annex A, the audit team verified a sample of server logs to determine if they can be edited or deleted. Which audit procedure was used?
The audit procedure used here is 'analysis.' The audit team analyzed server logs to verify if they can be edited or deleted, focusing on evaluating the logs' properties and the controls over their manipulation to ensure they comply with ISO/IEC 27001 requirements.
Jessenia
3 months agoStarr
3 months agoChery
3 months agoFelicidad
4 months agoOllie
4 months agoTheodora
4 months agoDevora
4 months agoJaime
4 months agoBethanie
5 months agoHortencia
5 months agoAlfreda
5 months agoBlondell
5 months agoRocco
5 months agoJodi
5 months agoViola
1 year agoLizbeth
1 year agoClorinda
1 year agoJustine
1 year agoStacey
1 year agoLeeann
1 year agoKrissy
1 year agoBeth
1 year agoVicky
1 year agoDannie
1 year agoEliseo
1 year agoSkye
1 year agoViola
1 year agoDell
1 year agoCarmela
1 year agoMillie
1 year agoAudrie
1 year agoDulce
1 year agoLoreta
1 year agoSharita
1 year agoEun
1 year agoDelsie
1 year ago