Page 650 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 650

protect resulting logs from unwanted access or alteration so that they
               provide an accurate and reliable record of activity and interaction that

               documents every user’s (including administrators or other trusted
               individuals with high levels of privilege) history on that system. In
               addition to the need for reliable auditing and monitoring systems to
               support accountability, there must be a resilient authorization system
               and an impeccable authentication system.
   645   646   647   648   649   650   651   652   653   654   655