An important part of securing a computer system is the monitoring process. There are various log files that can be used to determine if systems are under attack and thereby we can take corrective measure.
Without formal procedure/ standard that specifies steps for handling the database logs review, the staff may not aware about how the important of security logs review.
Without a periodic review of the relevant security events, the chances of unauthorised personnel gaining access without being noticed increases and the security breaches may not be detected