8.10 Application log does not include sensitive dataΒΆ

Verify that an audit log or similar allows for non-repudiation of key transactions.

Levels: 2, 3