1. Describe the mitigation procedures used to address the difficulties identified in Problem 26.5.
2. Describe the basic policy for log management.
3. Describe how to protect XML content in web service messages.
4. Describe how to create and maintain a log management infrastructure.