Queen of Repudiation II
An attacker can say, “I didn’t do that,” and you’d have no way to prove them wrong.
Threat |
|
You are not synchronizing system time between environments, so it is impossible to correlate data to determine who did what across the entire system. If your software architecture includes multiple services talking to one another, you may need to look at log files for multiple different services to trace what happened as data moved through your system. If those services are not synchronized, it becomes difficult to connect the log entries to the same data flow. |
|
CAPEC |
N/A |
ASVS |
7.1.4 - Ensure log entries are sufficiently complete for forensics to reconstruct the chain of events. 7.3.4 - Ensure clocks are synched with an atomic... |