Which of the following should be the PRIMARY consideration when implementing controls for monitoring user activity logs?
A. Building correlations between logs collected from different sources
B. Ensuring the control is proportional to the risk
C. Implementing log analysis tools to automate controls
D. Ensuring availability of resources for log analysis
A. Building correlations between logs collected from different sources
B. Ensuring the control is proportional to the risk
C. Implementing log analysis tools to automate controls
D. Ensuring availability of resources for log analysis