Monitoring policy

  1. All security-related actions on server systems must be logged and audit reports should be saved as follows:
  1. Any event related to security being compromised should be reported to the InfoSec team. They shall then review the logs and report the incident to the IT department.
  2. Some examples of security-related events are as follows: