Level N/A
Mechanisms exist to perform after-the-fact reviews of configuration change logs to discover any unauthorized changes.
Mechanisms exist to perform after-the-fact reviews of configuration change logs to discover any unauthorized changes.