Skip to main content
CUI

Documentation - V-222501

V-222501

Application Security and Development Security Technical Implementation Guide

CAT II

Title

The application must protect audit information from unauthorized modification.

Description

<VulnDiscussion>If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity of audit data, the information system and/or the application must protect audit information from unauthorized modification. This requirement can be achieved through multiple methods, which will depend upon system architecture and design. Some commonly employed methods include ensuring log file...

Fix Text (Documentation Requirement)

Configure the application to protect audit data from unauthorized modification and changes. Limit users to roles that are assigned the rights to edit audit data and establish permissions that control access to the audit logs and audit configuration settings.

Documentation Status

Cancel
CUI