8.6 Log events are completeΒΆ

Verify that security logs are protected from unauthorized access and modification.

Levels: 2, 3