When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
When configured properly, logs have the capability to track and record every code, infrastructure, and configuration change. They can connect these changes to the submitter and approver, as well as include the test results. This level of detailed logging is essential for maintaining an audit trail, ensuring accountability, and supporting compliance with policies and regulations. Therefore, the statement is true.
10.1.3.3 Deployment Pipeline Security page 114
B. True When logs are properly configured, they can track and record every code, infrastructure, and configuration change made within a system or environment. This includes capturing information about the submitter and approver of the changes, as well as any associated test results. Logs play a crucial role in maintaining an audit trail and providing accountability for changes made in a system. By analyzing logs, organizations can track the history of changes, identify potential issues or security breaches, and ensure compliance with policies and regulations. Therefore, the statement is true.