Download
| Alert*
Ensure only authorized users own audit log files.
Audit log files contain information about the system and system activity.Rationale:Access to audit records can reveal system and configuration data to attackers, potentially compromising its confidentiality
|