According to the report, support personnel working with an unidentified DOD system were able to alter system audit logs, which record all system activity and are a critical tool in identifying fraud and unauthorized access.
This has been a positive and appropriate activity at most companies, and in our experience, internal audit budgets have generally not simply been cut for the sake of cutting costs.