Every data modification (create, update, delete of data) is logged in a data store that cannot be erased or modified by system users.
Every data modification is logged
Related Quality Requirements
- Access Control via SSO | #usable #suitable #secure
- Access control is enforced | #secure #suitable
- Authenticity of a digital document | #secure #suitable
- Avoid common vulnerabilities | #reliable #secure
- Confidentiality by multi-tenancy | #secure
- Detailed audit log | #secure #suitable
- Employee attempts to modify pay rate | #secure
- Encrypted storage | #secure
- Only authenticated users can access data | #secure
- Parallel Data Modification | #usable #efficient #secure
- Zero-knowledge data storage | #secure