risks / Logs discovery
Description
Allows an attacker to inventory logs, such as viewing the types of logs collected, log fields, and aggregate statistics on logs.
Risk: LOW
This risk may assist in additional attacks, or gain access to confidential data that do not create organizational risk on their own.
Mitigations
- (No mitigations for this risk)
Links
- (No links for this risk)
Affected Privileges
An attacker may be able to exploit this risk if they gain any of the following privileges:
© 2023–present P0 Security and contributors to the IAM Privilege Catalog