Fluid Attacks logo
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us

REQ.080 Prevent log modification

This document contains the details of the security requirements related to the definition and management of Logs and events. This requirement establishes the importance of preventing log modifications or alterations in order to keep permanent records of all system activity.


System logs must not allow modifications or alterations.


  1. OWASP-ASVS v3.1-8.6 Verify that security logs are protected from unauthorized access and modification.

  2. OWASP-ASVS v3.1-8.11 Verify that security logs have some form of integrity checking or controls to prevent unauthorized modification.

Service status - Terms of Use