Mechanisms exist to restrict access to the management of event logs to privileged users with a specific business need.
Does the organization restrict access to the management of event logs to privileged users with a specific business need?