LOG-02: Are processes, procedures, and technical measures defined, implemented, and
evaluated to ensure audit log security and retention?
Log protection methodology should be applied in adherence to any applicable legal, statutory or regulatory compliance obligations. In the absence of those requirements, they should adhere to any standards established as appropriate for the business.
Control implemented
Control ownership
Description
Define, implement and evaluate processes, procedures and technical
measures to ensure the security and retention of audit logs.