Skip to main content
CUI

Documentation - V-222500

V-222500

Application Security and Development Security Technical Implementation Guide

CAT II

Title

The application must protect audit information from any type of unauthorized read access.

Description

<VulnDiscussion>If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult if not impossible to achieve. In addition, access to audit records provides information an attacker could potentially use to his or her advantage. To ensure the veracity of audit data, the information system and/or the application must protect audit information from any and all unauthorized access. This includes read, w...

Fix Text (Documentation Requirement)

Configure the application to protect audit data from unauthorized access. Limit users to roles that are assigned the rights to view, edit or copy audit data, and establish permissions that control access to the audit logs and audit configuration settings.

Documentation Status

Cancel
CUI