Mechanisms exist to protect event logs and audit tools from unauthorized access, modification and deletion.
Does the organization protect event logs and audit tools from unauthorized access, modification and deletion?