V-222622
Application Security and Development Security Technical Implementation Guide
Title
The ISSO must review audit trails periodically based on system documentation recommendations or immediately upon system security events.
Description
<VulnDiscussion>Without access control the data is not secure. It can be compromised, misused, or changed by unauthorized access at any time.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IACo...
Fix Text (Documentation Requirement)
Establish a scheduled process for reviewing logs. Maintain a log or records of dates and times audit logs are reviewed.