Audibility goals contribute to the security of the design, and can be summed up as demanding that every incoming and outgoing traffic is logged, and every viewing and modification of data is logged and can be traced back to its originator.

I usually describe how audibility is achieved in each relevant technology, and in every interface (user interfaces, APIs etc.)

Logs play a huge role in providing the desired level of auditability. But what about access to those logs? Does the logging system also log which users read them?

Describe how your design ensures maintaining and securely protecting an audit trail.