CCC.F03: Access/Activity Logs
Description:Provides users with the ability to track all requests made to or
activities performed on resources for audit purposes.
Related Threats:
ID | Title | Description |
---|---|---|
CCC.TH07 | Logs are Tampered With or Deleted | Logs may be tampered with or deleted due to inadequate access controls, or misconfigurations. This can make it difficult to identify security incidents, disrupt forensic investigations, and affect the accuracy of audit trails. |
CCC.TH09 | Logs or Monitoring Data are Read by Unauthorized Users | Unauthorized access to logs or monitoring data may expose valuable information about the system's configuration, operations, and security mechanisms. This could allow for the identification of vulnerabilities, enable the planning of attacks, or hinder the detection of ongoing incidents. |
CCC.TH10 | Alerts are Intercepted | Event notifications may be intercepted due to misconfigurations, inadequate security measures, or unauthorized access. This could expose information about sensitive operations or access patterns, potentially impacting system security and integrity. |