LOG-09: Does the information system protect audit records from unauthorized access,
modification, and deletion?
Access to audit records should be granted based on a least-privilege basis and only to authorized individuals. Changes to logs, including deletions, should be tracked and approved by authorized individuals. Logs should be backed up per organizational policies.
Control implemented
Control ownership
Description
The information system protects audit records from unauthorized access,
modification, and deletion.