PCI-10.5.6:

From HORSE - Holistic Operational Readiness Security Evaluation.
Revision as of 15:24, 21 February 2007 by Mdpeters (talk | contribs) (New page: Verify the following via inquiry of the system administrator and review of file permissions: :* Obtain security policies and procedures and determine that they include procedures to revie...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Verify the following via inquiry of the system administrator and review of file permissions:

  • Obtain security policies and procedures and determine that they include procedures to review security logs at least daily, and that follow-up to exceptions is required.
  • Through observation and interviews, determine that regular log reviews are performed for all system components.