Insufficient Logging
The weakness involves a case where the software either does not record the event or omits important details about the event when logging it, allowing an attackers to hide their presence on the system or malicious activity.
The weakness involves a case where the software either does not record the event or omits important details about the event when logging it, allowing an attackers to hide their presence on the system or malicious activity.