Skip to main content

πŸ’Ό RA-5(8) Vulnerability Monitoring and Scanning | Review Historic Audit Logs

Description​

Review historic audit logs to determine if a vulnerability identified in a [Assignment: organization-defined system] has been previously exploited within an [Assignment: organization-defined time period].

Similar​

  • Internal
    • ID: dec-c-cd66c2ca

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό RA-5(8) Review Historic Audit Logs (H)

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags