O'Reilly logo

Official (ISC)2 Guide to the CISSP CBK, Fourth Edition, 4th Edition by Adam Gordon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image

Appendix G

Domain 6 Materials

The following are samples of the Log Management Policies and Procedure documents that are referenced in Domain 6 – Security Assessment and Testing. You can download the materials from this appendix for free by going to the following link:

https://learning.isc2.org/content/cissp-textbook-appendices

Sample Log Management Policy

Revisions

V2.0 8.13.2014

Purpose:

The purpose of this policy is to establish a requirement to enable and review logs on ABC Corp. IT resources that store, access, or transmit data classified by ABC Corp. as Confidential or Private.

Scope:

This policy covers all ABC Corp. data that is available ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required