SAMMY works best on screens 1024px wide or larger.
Log Protection
LOG-09: Does the information system protect audit records from unauthorized access, modification, and deletion?
Access to audit records should be granted based on a least-privilege basis and only to authorized individuals. Changes to logs, including deletions, should be tracked and approved by authorized individuals. Logs should be backed up per organizational policies.
Control implemented
Control ownership
Description

The information system protects audit records from unauthorized access, modification, and deletion.