1. Separate system logs from audit logs
2. Add controls to permit logging granularity levels, both for system logs and audit logs
3. Add controls to permit log rollover based on both file size and duration.
4. Support for remote log file storage.
5. Ensure that user credentials (including hash values) are not written to log files