An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset. The asset can be a building, a room or a computer file.
An audit log is a document that records an event in an information (IT) technology system.
Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.