H. of Repudiation II
Our audit log contains personal data, and we do not record who looks at our audit logs.
Threat |
|
You are not verifying that your configuration settings are secure and have debug enabled in production. The production logs are accessible by everyone in the development team without any approval process. |
|
CAPEC |
CAPEC-180 - Exploiting Incorrectly Configured Access Control Security Levels CAPEC-176 - Configuration/Environment Manipulation CAPEC-75 - Manipulating Writeable Configuration Files |
ASVS |
14.1.3 - Ensure configuration is hardened in line with vendor guidelines. 14.1.5 - Ensure you have integrity controls on configuration and alerting on change events. |
CWE |
CWE-15 - External Control... |