Audit logs should track access to aid upon detection of suspicious activity and contain sufficient data to support investigative needs for security breaches.
Access to all audit logs should be restricted based on need-to-know and least privilege principles. Additionally, monitor all relevant actions taken. In the case of unintended or unauthorized actions, alerts should occur.
Restrict audit logs access to authorized personnel and maintain records that provide unique access accountability.