M5.5.2 - PROTECTION OF INFORMATION SYSTEMS AUDIT TOOL Implementation Guidance
The entity shall protect access to information systems audit tools to prevent any possible misuse or compromise.
Back to M5.5.2 - P4 - PTOTECTION OF INFORMATION SYSTEMS AUDIT TOOL
Information systems audit tools, e.g. software or data files, should be separated from development and operational systems and not held in tape libraries or user areas, unless given an appropriate level of additional protection.
Back to M5.5.2 - P4 - PTOTECTION OF INFORMATION SYSTEMS AUDIT TOOL