Back to Trust Center
A
Automated Access Enforcement / Auditing

Mechanisms exist to perform after-the-fact reviews of configuration change logs to discover any unauthorized changes.