Additional Document
1. Procedure that include:
- Log monitoring against predefined events to identify security incidents.
- Periodic review of database logs and evidences of review and approval for future reference.
- Evidence for daily review of OS logs and approval.