Skip to main content

Prevent log modification

Summary​

System logs must not allow modifications or alterations.

Description​

Logs are used to analyze a system's behavior. They help detect errors and suspicious activity, and often hold very sensitive information. Therefore, they should be protected so that no unauthorized actor can modify them, since this could prevent a vulnerability or a breach from being noticed in a timely manner.

Supported In​

This requirement is verified in following services:

PlanSupported
Machine🟢
Squad🟢
One-Shot🟢

References​

Vulnerabilities​