This chapter looks at the analysis of system and application logs generated by the organization. It shows how logs can be used to derive insights, gain a better understanding of the business, and identify high-risk areas of systems and applications. The knowledge of the high-risk regions can be used in internal audit’s risk assessment process.
The chapter is organized like a recipe – the goal of the recipe, ingredients, instructions, and variation and serving. The accompanying code is available at the GitHub repository specified ...