Articles

100 Log Management Uses #44 Data access (CAG control 9)

We continue our journey through the Consensus Audit Guidelines and today look at Control 9 – data access on a need to know basis. Logs help with monitoring of the enforcement of these policies, and user activities such as file, folder access and trends should all be watched closely.

By Ananth

EventTracker SIEM Trial

EventTracker SIEM Trial

Experience the difference of a platform built to deliver vital and actionable data.

Try it for Free