Which of the following is MOST important to the integrity of a security log?