Next:
Audit collection system (internal
Up:
Security Audit Procedures
Previous:
Protection of audit log
 
Contents
Audit log backup procedures
See section 4.5.4.
David Groep
2001-11-05