A cloud security engineer is conducting an investigation into a suspected unauthorized access incident. While analyzing the logs, they notice inconsistencies across multiple systems, making it difficult to establish an accurate trail of events. Which of the following is the MOST likely cause of this issue?