Is sufficient detail contained in Web Server and application logs to support incident investigation?

book reader icon
1 Minute
facebook logo gray
linkedin logo gray
mail logo gray

Yes. Next to our Audit Trail Logs, our Web Servers' and applications' logs are sufficiently detailed to support any necessary incident investigation.

In accordance with all relevant internal Policies and compliance requirements, all logs are retained for as long and in such detail as indicated (including successful/failed login attempts or changes to configuration settings or files), and are used in forensic analysis
whenever necessary.

Last update 1 month ago