8.5—8.5
>Control Description
Configure detailed audit logging for enterprise assets containing sensitive data. Include event source, date, username, timestamp, source addresses, destination addresses, and other useful elements that could assist in a forensic investigation.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.