• Violation reports—Indicate any unsuccessful and unauthorized
access attempts. Violation reports should indicate the terminal
location, date and time of attempted access. These reports
should evidence managerial review. Repeated unauthorized
access violations may indicate attempts to circumvent access
controls. Testing may include review of follow-up activities.