Skip to main content

💼 10.3 Audit logs are protected from destruction and unauthorized modifications.

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-64da71b3

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 10.3.1 Read access to audit logs files is limited to those with a job-related need.
💼 10.3.2 Audit log files are protected to prevent modifications by individuals.24
💼 10.3.3 Audit log files, including those for external-facing technologies, are promptly backed up to a secure, central, internal log server(s) or other media that is difficult to modify.
💼 10.3.4 File integrity monitoring or change-detection mechanisms is used on audit logs to ensure that existing log data cannot be changed without generating alerts.22