Every data modification (create, update, delete of data) is logged in a data store that cannot be erased or modified by system users.
Every data modification is logged
Related Quality Requirements
- Avoid common vulnerabilities | #reliable #secure
- Confidentiality by multi-tenancy | #secure
- Employee attempts to modify pay rate | #secure
- Encrypted storage | #secure
- Only authenticated users can access data | #secure
- Zero-knowledge data storage | #secure