When reviewing the company's logs as part of regular duties, it is considered a detective control. Detective controls are used to detect security incidents and other unauthorized activities that have already occurred. In the logs, verify that access control mechanisms are working as intended. Additionally, the logs must be centralized and automated, with secure access that limits administrators' authority. A retention policy should also be in place to ensure compliance and retain the logs as long as necessary.
Welcome to the world of Cyber Security with the Certified Information System Security Professional (CISSP). This video will give you an overview of security fundamentals and teach you the skills necessary to become a certified professional.
Low-level vulnerabilities generally refer to issues that don't pose a significant threat to the system but should still be investigated and addressed. Common causes for a vulnerability to be labeled as "low" include the severity of its impact, its complexity to exploit, or the likelihood of its occurrence.