Fluid Attacks logo
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us

REQ.084 Allow transaction history queries

This document contains the details of the security requirements related to the definition and management of Logs in the organization. This requirement establishes the importance of allowing consults in log history for authorized users, in order to ease the tracking and response in a security event.


System must allow authorized users the inspection of their own transaction history.


  1. HIPAA Security Rules 164.308(a)(1)(ii)(D): Information System Activity Review: Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.

Service status - Terms of Use