Skip to main content

Prevent log modification

Summary​

System logs must not allow modifications or alterations.

Description​

Logs are used to analyze a system's behavior. They help detect errors and suspicious activity, and often hold very sensitive information. Therefore, they should be protected so that no unauthorized actor can modify them, since this could prevent a vulnerability or a breach from being noticed in a timely manner.

Supported In​

This requirement is verified in following services

PlanSupported
Essential🟢
Advanced🟢

References​

Vulnerabilities​

free trial

Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.