8.10 Application log does not include sensitive dataΒΆ
Verify that an audit log or similar allows for non-repudiation of key transactions.
Levels: 2, 3
Verify that an audit log or similar allows for non-repudiation of key transactions.
Levels: 2, 3