Access logs and error logs are used for both understanding systems and detecting errors.
Critical information can be compromised if these files are accessed by anyone. This information can be:
It would also be critical if it combines with other weaknesses.
It should be removed or access restriction should be applied.