Home/CISA CPG/2 — Device Security/2.U2.U—Log Protection>Control DescriptionOrganizations' security logs are protected from unauthorized access and tampering.>Cross-Framework MappingsSCFMON-08CompareMON-08.1CompareMON-08.2CompareMON-10CompareAsk AIConfigure your API key to use AI features.Add Key