Next:
Audit collection system (internal
Up:
Security Audit Procedures
Previous:
Protection of audit log
 
Contents
Audit log backup procedures
See section 4.5.4.
David Groep 2005-01-07