7.1.3
Verify that the application logs security relevant events including successful and failed authentication events, access control failures, deserialization failures and input validation failures.