Skip to main content
← Back to CCC Virtual Private Cloud

CCC.C09: Prevent Tampering, Deletion, or Unauthorized Access to Access Logs

Objective:Access logs should always be considered sensitive. Ensure that access logs are protected against unauthorized access, tampering, or deletion.
Control Family:
Data
Threats:
IDTitleDescription
CCC.TH07Logs are Tampered With or DeletedAttackers may tamper with or delete logs to cover their tracks and evade detection. This prevents security teams from identifying the full scope of an attack and may disrupt forensic investigations.
CCC.TH09Logs or Monitoring Data are Read by Unauthorized UsersUnauthorized access to logs or monitoring data can provide attackers with valuable information about the system's configuration, operations, and security mechanisms. This can be used to identify vulnerabilities, plan attacks, or evade detection.
CCC.TH04Data is Replicated to Untrusted or External LocationsAn attacker could replicate data to untrusted or external locations if replication configurations are not properly restricted. This could result in data leakage or exposure to unauthorized entities outside the organization's trusted perimeter.
NIST CSF:
PR.DS-6

Control Mappings

CCM:
ISO_27001:
NIST_800_53:
AU-9

Test Requirements

CCC.C09.TR01:When access logs are stored, the service MUST ensure that access logs cannot be accessed without proper authorization.
TLP:
tlp_amber
tlp_red
tlp_green
tlp_clear
CCC.C09.TR02:When access logs are stored, the service MUST ensure that access logs cannot be modified without proper authorization.
TLP:
tlp_amber
tlp_red
tlp_green
tlp_clear
CCC.C09.TR03:When access logs are stored, the service MUST ensure that access logs cannot be deleted without proper authorization.
TLP:
tlp_amber
tlp_red
tlp_green
tlp_clear