Under active development Content is continuously updated and improved

8.58.5

>Control Description

Configure detailed audit logging for enterprise assets containing sensitive data. Include event source, date, username, timestamp, source addresses, destination addresses, and other useful elements that could assist in a forensic investigation.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.