Examples of Security Event Logs in a sentence
The Contractor must ensure that Protected Information and Tenancy Security Event Logs on magnetic media are securely wiped by overwriting using procedures and adequate media wiping solutions, degaussing, or other method in line with security best practices for disposal of media.
The Contractor must review Security Event Logs regularly to detect potential security incidents, using automated tools or equivalent processes for the monitoring, review, correlating and alerting of Security Event Logs.
The Contractor must ensure that logging of Security Event Logs is enabled on all applicable Systems components The Contractor must retain Security Event Logs for the Systems online for a minimum of 90 days and either online or off-line for an additional period of time adequate to enable the Contractor to conduct effective security investigations into suspected or actual security incidents.
The Contractor must securely erase: records that contain Protected Information and Tenancy Security Event Logs when instructed in writing by the Province; and any backup, transitory and extra copies of records that contain Protected Information or Tenancy Security Event Logs when no longer needed in relation to this Agreement.
The Contractor must retain Tenancy Security Event Logs online for a minimum of 90 days and either: such additional period of time as the Province may instruct; or ensure that the Tenancy offers the technical capability for the Province to retain the Tenancy Security Event Logs, to enable the Province to comply with an information schedule approved under the Information Management Act or other retention period required by law.
Upon the Province’s request, the Contractor must ensure that the Tenancy offers the technical capability for the Province to enable or configure the forwarding, extraction, backup of Tenancy Security Event Logs from the Tenancy to the Province’s security information and event management system or to an external log storage and retention system.
Upon the Purchaser’s request, the Contractor must ensure that the Tenancy offers the technical capability for the Purchaser to enable or configure the forwarding, extraction, backup of Tenancy Security Event Logs from the Tenancy to the Purchaser’s security information and event management system or to an external log storage and retention system.
The Contractor must securely erase: records that contain Protected Information and Tenancy Security Event Logs when instructed in writing by the Purchaser; and any backup, transitory and extra copies of records that contain Protected Information or Tenancy Security Event Logs when no longer needed in relation to this Order.
The Contractor must retain Tenancy Security Event Logs online for a minimum of 90 days and either: such additional period of time as the Purchaser may instruct; or ensure that the Tenancy offers the technical capability for the Purchaser to retain the Tenancy Security Event Logs, to enable the Purchaser to comply with an information schedule approved under the Information Management Act or other retention period required by law.
Remote unauthenticated access to the System and Security Event Logs must be disabled.