Logs must be secured to prevent:

A.
Creation, modification, and destruction.
B.
Modification, deletion, and initialization.
C.
Modification, deletion, and destruction.
D.
Modification, deletion, and inspection.
Explanation:
All logs collected are used in the active and passive monitoring process. All logs are kept on archive
for a period of time. This period of time will be determined by your company policies. This allows the
use of logs for regular and annual audits if retention is longer then a year. Logs must be secured to
prevent modification, deletion, and destruction.