Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured system. Event log data must be protected from unauthorized access, including from legitimate administrators who do not need this type of access. Without this protection, a compromise or loss of log data needed for incident analysis or risk assessment is possible.
Direct log modification is not recommended. If it becomes necessary for operational or mission essential reasons, the modification action must generate an audit log entry in compliance with CCI-000172. |