8.11 A sufficiently advanced log analysis tool is availableΒΆ

Verify that security logs have some form of integrity checking or controls to prevent unauthorized modification.

Levels: 3