Audit Logging; Intrusion Detection Sample Clauses

Audit Logging; Intrusion Detection. We shall collect and retain audit logs recording privileged user access activities, authorised and unauthorised access attempts, system exceptions, and information security events, complying with applicable policies and regulations. Audit logs shall be reviewed at least daily and automated detection tools shall be implemented to help facilitate timely detection, investigation by root cause analysis and response to incidents. Physical and logical user access to audit logs shall be restricted to authorised Parties only.