Automated mechanisms exist to enforce dual authorization for the movement or deletion of event logs.
Does the organization use automated mechanisms to enforce dual authorization for the movement or deletion of event logs?