| 💼 10.3.1 Read access to audit logs files is limited to those with a job-related need. | | | | | no data |
| 💼 10.3.2 Audit log files are protected to prevent modifications by individuals. | | | 4 | | no data |
| 💼 10.3.3 Audit log files, including those for external-facing technologies, are promptly backed up to a secure, central, internal log server(s) or other media that is difficult to modify. | | | | | no data |
| 💼 10.3.4 File integrity monitoring or change-detection mechanisms is used on audit logs to ensure that existing log data cannot be changed without generating alerts. | | | 2 | | no data |