The records of such events are stored in a file known as a security log, whose contents are available only to those with the proper clearance.authenticationThe process of verifying the identity of a user, computer, process, or other entity by validating the credentials provided by the entity.