PCI-10.5.7:

From HORSE - Holistic Operational Readiness Security Evaluation.
Revision as of 15:25, 21 February 2007 by Mdpeters (talk | contribs) (New page: Verify the following via inquiry of the system administrator and review of file permissions: :* Obtain security policies and procedures and determine that they include audit log retention...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Verify the following via inquiry of the system administrator and review of file permissions:

  • Obtain security policies and procedures and determine that they include audit log retention policies and require audit log retention for at least one year.
  • For the sample of (insert number and/or description of sample) system components, verify that audit logs are available online or on tape for at least one year.