Young hacker smiling

We hack your software

zero false positives

Attacking Applications, APIs, Mobile Apps Servers, Networks, IoT Devices
ICS: Industrial Control System
SOC: Security Operations Center

REQ.084 Allow transaction history queries

This document contains the details of the security requirements related to the definition and management of Logs in the organization. This requirement establishes the importance of allowing consults in log history for authorized users, in order to ease the tracking and response in a security event.

Requirement

System must allow authorized users the inspection of their own transaction history.

References

  1. HIPAA Security Rules 164.308(a)(1)(ii)(D): Information System Activity Review: Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.


Service status - Terms of Use