Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • :'''Record at least the following audit trail entries for each event, for all system components:'''<br> ...on, for each auditable event mentioned in [[PCI_10: | PCI-10.2]], that the audit trail captures the following information: ...
    2 KB (280 words) - 20:46, 2 March 2007
  • :'''Secure audit trails so they cannot be altered in any way, including the following:'''<br ::'''PCI-10.5.2:''' Current audit trail files are protected from unauthorized modifications via access contro ...
    2 KB (282 words) - 21:01, 2 March 2007
  • :'''Record at least the following audit trail entries for each event, for all system components:'''<br> ...on, for each auditable event mentioned in [[PCI_10: | PCI-10.2]], that the audit trail captures the following information: ...
    2 KB (281 words) - 20:48, 2 March 2007
  • ::'''1. PCI-10.5.1 Limit viewing of audit trails to those with a job-related need.''' ::'''2. PCI-10.5.2 Protect audit trail files from unauthorized modifications.''' ...
    3 KB (377 words) - 18:52, 4 May 2006
  • ...ze the effectiveness of and to minimize interference to or from the system audit process. This section provides templates for an Information Security Progra ==Information systems audit considerations== ...
    6 KB (774 words) - 12:41, 25 May 2007
  • ...rance services to provide the board—this will occur most likely through an audit committee—with timely independent assurance about the compliance of IT with ISO12.3 System audit considerations.<br> ...
    2 KB (300 words) - 13:39, 4 May 2006
  • ...ants or certification bodies. Qualifications of individuals performing the audit must be ensured.<br> ...
    2 KB (294 words) - 13:08, 4 May 2006
  • Documentation for EDP audit packages used to detect method of crime as subject of discovery is discusse ...
    522 bytes (72 words) - 10:44, 5 March 2009
  • Association for Computing Machinery Special Interest Group on Security Audit and Control, 11 W 42 St., New York NY 10036 (212) 869-7440. ...
    631 bytes (82 words) - 02:56, 5 March 2009
  • ...ailability, and testing. Perform a [[Information_Security_Audit | security audit]] reassessment when significant technical or logical discrepancies occur du ...
    2 KB (329 words) - 13:35, 6 March 2007
  • * '''Audit:''' Review and audit are required to ensure that the organization’s CM process is adhered to and :'''Primary forms of audit include:''' ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ...g rules. Also, if fraud occurs and your organization has not completed the audit requirements, financial and legal responsibility will be placed more heavil ...
    2 KB (235 words) - 09:48, 23 October 2012
  • Implement internal control, security and audit ability measures during configuration, integration and maintenance of hardw ...
    1 KB (146 words) - 17:19, 7 June 2006
  • ...ontrol.jpg]][[PCI-9.1.1:|PCI-9.1.1 Use cameras to monitor sensitive areas. Audit this data and correlate with other entries. Store for at least three months ...Key-control.jpg]][[PCI-9.4:|PCI-9.4 Use a visitor log to retain a physical audit trail of visitor activity. Retain this log for a minimum of three months, u ...
    4 KB (604 words) - 15:30, 1 March 2007
  • :'''Secure audit trails so they cannot be altered in any way, including the following:'''<br ...
    2 KB (283 words) - 21:03, 2 March 2007
  • ...:''' Verify, via observation and inquiry of the system administrator, that audit trails are enabled and active, including for any connected wireless network ...
    2 KB (278 words) - 20:33, 2 March 2007
  • :'''Secure audit trails so they cannot be altered in any way, including the following:'''<br ...
    2 KB (290 words) - 21:04, 2 March 2007
  • ...ns that currently have a [[SAS 70]] service auditor’s examination (“SAS 70 audit”) performed, some changes will be required to effectively reporting under t ...ce Auditor's Report, a service organization may have to entertain multiple audit requests from its customers and their respective auditors. Multiple visits ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...-virus mechanisms are current, actively running, and capable of generating audit logs.]]<br> ...
    1 KB (199 words) - 18:10, 28 February 2007
  • :'''Use a visitor log to retain a physical audit trail of visitor activity. Retain this log for a minimum of three months, u ...
    2 KB (317 words) - 14:19, 2 March 2007
View ( | ) (20 | 50 | 100 | 250 | 500)