ISC2 Certified Cloud Security Professional (CCSP) Practice Question
Your company hosts a multi-tenant IaaS environment. Security policy states that security event logs must remain admissible as evidence in court. Today, the log collector writes files to shared network storage and records a SHA-256 hash of every file in a protected database once the file is closed. During a recent audit, the assessor concluded that the current setup still fails to maintain a complete chain of custody and does not provide strong non-repudiation during long-term retention. Which additional control would best close this gap?
Store each file's hash in the same directory as the log so integrity can be checked locally when needed.
Replicate log files to write-once/read-many object storage and enable immutable retention policies to prevent any alteration or deletion.
Move closed log files to a low-cost cold storage tier after 30 days to reduce accidental modification risk.
Encrypt every log file with a rotating AES-256 symmetric key before storage to prevent disclosure of contents.
Hashing each log file on close helps detect later tampering, but it does not stop privileged users-or an attacker who gains such privileges-from altering or deleting the log files and then recomputing the hash value in the secure database. Replicating log data to write-once/read-many (WORM) storage that is protected by an immutable retention lock prevents any modification or deletion for the defined retention period. Combining WORM immutability with existing hashing supplies both the preventative control (immutability) needed for a defensible chain of custody and the detective control (hash comparison) needed for non-repudiation. The other options do not ensure immutability or verifiable custody: keeping hashes next to the logs exposes them to the same tampering risk, encryption alone protects confidentiality but not integrity against authorized insiders, and moving data to cheaper cold storage without immutability does nothing to prevent alteration or removal.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is WORM (Write-Once/Read-Many) storage and why is it used for logs?
Open an interactive chat with Bash
How does hashing support log integrity?
Open an interactive chat with Bash
What is non-repudiation and why is it important for logs?
Open an interactive chat with Bash
ISC2 Certified Cloud Security Professional (CCSP)
Cloud Data Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .