next up previous contents
Next: Audit collection system (internal Up: Security Audit Procedures Previous: Protection of audit log   Contents

Audit log backup procedures

See section 4.5.4.



David Groep
2001-10-12