There is no authorization boundary for the application.
+This is a notional example that will be permenantely in a development state. No authorization boundary will be defined.
+When threat actors want to confirm they have successfully performed privilege escalation, they will want to confirm they have elevated system privileges.
+Responsible staff for a given role must monitor systems logs in a centralized logging system to confirm organizationally-recommended commands have not been run in a privileged context.
+This test documents which Splunk commands you will run to look for commands associated with indicators of compromise.
+The internal structure of structuring and passing parameters of the query is yet to be determined.
+This component documents Example System, an information system under development that makes use of automated system evaluation with rules.
+This is an example system to demonstrate the use of rules for auditing requirements.
+Example System follows the Risk Management Framework as defined in SP 800-37 and 800-53 for risk management, privacy, and security guidance.
+This describes how Example System requires system operators to perform a full text analysis of logged privileged commands in a physically distinct component or subsystem of the system, or other system that is dedicated to that analysis.
+