Last Updated on December 25, 2021 by Admin 3
- CISA : Part 1 - 40
- CISA : Part 41 - 80
- CISA : Part 81 - 120
- CISA : Part 121 - 160
- CISA : Part 161 - 172
Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?
- Only collect logs from servers classified as business critical.
- Limit the use of logs to only those purposes for which they were collected.
- Limit log collection to only periods of increased security activity.
- Restrict the transfer of log files from host machine to online storage.
- CISA : Part 1 - 40
- CISA : Part 41 - 80
- CISA : Part 81 - 120
- CISA : Part 121 - 160
- CISA : Part 161 - 172