8.11 A sufficiently advanced log analysis tool is available Verify that security logs have some form of integrity checking or controls to prevent unauthorized modification. Levels: 3