Skip to main content

CCC.Core.F03: Access Log Publication

Capability ID:CCC.Core.F03
Title:Access Log Publication
Description:The service automatically publishes structured, verbose records of activities performed within the scope of the service by external actors.

Mapped Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.Core.TH07Logs are Tampered With or DeletedTampering or deletion of service logs will reduce the system's ability to maintain an accurate record of events. Any actions that compromise the integrity of logs could disrupt system availability by disrupting monitoring, hindering forensic investigations, and reducing the accuracy of audit trails.
1
1
0
CCC.Core.TH09Runtime Logs are Read by Unauthorized EntitiesUnauthorized access to logs may expose valuable information about the system's configuration, operations, and security mechanisms. This could jeopardize system availability through the exposure of vulnerabilities and support the planning of attacks on the service, system, or network. If logs are not adequately sanitized, this may also directly impact the confidentiality of sensitive data.
1
1
0