Vulnerability Discussion
Protection of log data includes ensuring the log data is not accidentally lost or deleted. Audit information stored in one location is vulnerable to accidental or incidental deletion or alteration.
Check
Determine if a process to back up log data to a different system or media than the system being audited has been implemented.
If it has not, this is a finding.
Fix
Establish and implement a process for backing up log data to another system or media other than the system being audited.