Logs must be secured to prevent:
A.
Creation, modification, and destruction.
B.
Modification, deletion, and initialization.
C.
Modification, deletion, and destruction.
D.
Modification, deletion, and inspection.
Explanation:
All logs collected are used in the active and passive monitoring process. All logs are
kept on archive for a period of time. This period of time will be determined by your
company policies. This allows the use of logs for regular and annual audits if
retention is longer then a year. Logs must be secured to prevent modification,
deletion, and destruction.