Young hacker smiling

We hack your software

zero false positives

Expert intelligence + effective automation

REQ.080 Prevent log modification

This document contains the details of the security requirements related to the definition and management of Logs and events. This requirement establishes the importance of preventing log modifications or alterations in order to keep permanent records of all system activity.

Requirement

System logs must not allow modifications or alterations.

References

  1. OWASP-ASVS v3.1-8.6 Verify that security logs are protected from unauthorized access and modification.

  2. OWASP-ASVS v3.1-8.11 Verify that security logs have some form of integrity checking or controls to prevent unauthorized modification.


Service status - Terms of Use