Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Logging sensitive information can violate system security policies and can violate user privacy when the logging level is incorrect or when the log files are insecure.

Guideline Rule

Severity

Likelihood

Remediation Cost

Priority

Level

FIO08-J

medium

probable

high

P4

L3

...