Control Implementation
View control requirements, implementation steps, and evidence.
View control requirements, implementation steps, and evidence.
Protect logs with encryption, access controls, and audit trails to prevent unauthorized access, modification, or deletion, ensuring log integrity and confidentiality throughout the retention period.
Protect logs with encryption, access controls, and audit trails to prevent unauthorized access, modification, or deletion, ensuring log integrity and confidentiality throughout the retention period.
Control Type
preventive control - Designed to prevent issues before they occur
Review Frequency
Continuous, quarterly reviews
Risk Level
high - Important for compliance, requires prompt attention
Refer to the source standard for detailed implementation steps, evidence requirements, and success criteria.
AI Logging & Record-Keeping Standard →POL-AI-001
AI Governance Policy
View policy for full requirements mapping.
Control ID
LOG-004
Legal Basis
Articles 12, 19Source Standard
STD-AI-005Parent Policy
POL-AI-001Risk Level
High