Page 650 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 650
protect resulting logs from unwanted access or alteration so that they
provide an accurate and reliable record of activity and interaction that
documents every user’s (including administrators or other trusted
individuals with high levels of privilege) history on that system. In
addition to the need for reliable auditing and monitoring systems to
support accountability, there must be a resilient authorization system
and an impeccable authentication system.

