Security Logging Policy

Security Logging Policy

The Security Logging Policy was developed by the Company in order to allow the secure and effective use of the Information Technology Asset like computer, systems or data.

In general, a security’s log is a collection of records containing data about security relevant events, i.e., attempted violations of the security policy and changes to the security state of the system.

CONTENT

1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. REQUIREMENTS
4. RESPONSIBILITIES
4.1 EMPLOYEES
4.2 SYSTEM ADMINISTRATORS
4.3 DEPARTMENT MANAGER(S)
5. EXCEPTIONS
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION

Pages: 8

Review Security Logging Policy.

Related Products:

€1,549.00

Purchase

This bundle contains all the products listed in the Operations Management section. Take advantage of the 25% OFF when buying the bundle!

€49.00

Purchase

The Confidential Information – Breaches and Escalation Policy sets out the escalation procedures to follow in the event of a breach of confidential information within Company and requirements regarding the protection of confidential information with third party service providers.

€49.00

Purchase

The objective of this procedure is to ensure the security of Company’s assets. Effective security controls in relation to access the data are an essential component of the effective risk management of Company's data resource.