The change documents (master data from the source system) can be used as trace or log files, that contain information relevant for security.