Page 200 - ITGC_Audit Guides
P. 200

3.  Log monitoring – Are the security event logs secured and monitored to detect anomalous
                       activity?

                   Stakeholders such as senior management and the board require assurance that information
                   technology controls, including managing access to IT resources, are well designed and
                   effectively implemented.









































































                   3 — theiia.org
   195   196   197   198   199   200   201   202   203   204   205