Description

Failure to restrict access to logging facilities and log information may result in unauthorized access, log information tampering and loss of user activity evidence.

Applicability

  • This Control applies to all Texas A&M University information resources storing or accessing Cricial or Confidential data. The intended audience is information resource custodians who are responsible for the installation of new information resources, the operations of existing information resources, and individuals accountable for information resources security.

Implementation

  • Information resource custodians are responsible for protecting audit information and audit tools from unauthorized access, modification, or deletion.