Information
Without preservation, a complete discovery of an attack or suspicious activity may not be determined. DBMS audit data also contributes to the complete investigation of unauthorized activity and needs to be included in audit retention plans and procedures.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Develop, document and implement an audit retention policy and procedures.
It is recommended that the most recent thirty days of audit logs remain available online.
After thirty days, the audit logs may be maintained offline.
Online maintenance provides for a more timely capability and inclination to investigate suspicious activity.