logo

080 Prevent log modification


Summary

System logs must not allow modifications or alterations.


Description

Logs are used to analyze a system's behavior. They help detect errors and suspicious activity, and often hold very sensitive information. Therefore, they should be protected so that no unauthorized actor can modify them, since this could prevent a vulnerability or a breach from being noticed in a timely manner.


Supported In

Essential: True

Advanced: True


References


Weaknesses


Last updated

2024/03/05