LOG-04: Is access to audit logs restricted to authorized personnel, and are records
maintained to provide unique access accountability?
Audit logs should track access to aid upon detection of suspicious activity and contain sufficient data to support investigative needs for security breaches.
Access to all audit logs should be restricted based on need-to-know and least privilege principles. Additionally, monitor all relevant actions taken. In the case of unintended or unauthorized actions, alerts should occur.
Control implemented
Control ownership
Description
Restrict audit logs access to authorized personnel and maintain records
that provide unique access accountability.