Which combination of controls should be used to protect against tampering with and unauthorized access to log files?

1 Comment

  1. Andrea
    Author

    As I recall, the answer is:
    Ensure that the log file integrity validation mechanism is enabled.

Leave a Reply

Your email address will not be published. Required fields are marked *

twenty + five =