Skip to main content

๐Ÿ’ผ AU AUDIT AND ACCOUNTABILITY

  • Contextual name: ๐Ÿ’ผ AU AUDIT AND ACCOUNTABILITY
  • ID: /frameworks/nist-sp-800-53-r4/au
  • Located in: ๐Ÿ’ผ NIST SP 800-53 Revision 4

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-c16455a8

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ AU-1 AUDIT AND ACCOUNTABILITY POLICY AND PROCEDURES
๐Ÿ’ผ AU-2 AUDIT EVENTS423
ย ย ย ย ๐Ÿ’ผ AU-2 (1) COMPILATION OF AUDIT RECORDS FROM MULTIPLE SOURCES
ย ย ย ย ๐Ÿ’ผ AU-2 (2) SELECTION OF AUDIT EVENTS BY COMPONENT
ย ย ย ย ๐Ÿ’ผ AU-2 (3) REVIEWS AND UPDATES
ย ย ย ย ๐Ÿ’ผ AU-2 (4) PRIVILEGED FUNCTIONS
๐Ÿ’ผ AU-3 CONTENT OF AUDIT RECORDS2
ย ย ย ย ๐Ÿ’ผ AU-3 (1) ADDITIONAL AUDIT INFORMATION
ย ย ย ย ๐Ÿ’ผ AU-3 (2) CENTRALIZED MANAGEMENT OF PLANNED AUDIT RECORD CONTENT
๐Ÿ’ผ AU-4 AUDIT STORAGE CAPACITY1
ย ย ย ย ๐Ÿ’ผ AU-4 (1) TRANSFER TO ALTERNATE STORAGE
๐Ÿ’ผ AU-5 RESPONSE TO AUDIT PROCESSING FAILURES4
ย ย ย ย ๐Ÿ’ผ AU-5 (1) AUDIT STORAGE CAPACITY
ย ย ย ย ๐Ÿ’ผ AU-5 (2) REAL-TIME ALERTS
ย ย ย ย ๐Ÿ’ผ AU-5 (3) CONFIGURABLE TRAFFIC VOLUME THRESHOLDS
ย ย ย ย ๐Ÿ’ผ AU-5 (4) SHUTDOWN ON FAILURE
๐Ÿ’ผ AU-6 AUDIT REVIEW, ANALYSIS, AND REPORTING1022
ย ย ย ย ๐Ÿ’ผ AU-6 (1) PROCESS INTEGRATION
ย ย ย ย ๐Ÿ’ผ AU-6 (2) AUTOMATED SECURITY ALERTS
ย ย ย ย ๐Ÿ’ผ AU-6 (3) CORRELATE AUDIT REPOSITORIES
ย ย ย ย ๐Ÿ’ผ AU-6 (4) CENTRAL REVIEW AND ANALYSIS
ย ย ย ย ๐Ÿ’ผ AU-6 (5) INTEGRATION _ SCANNING AND MONITORING CAPABILITIES
ย ย ย ย ๐Ÿ’ผ AU-6 (6) CORRELATION WITH PHYSICAL MONITORING
ย ย ย ย ๐Ÿ’ผ AU-6 (7) PERMITTED ACTIONS
ย ย ย ย ๐Ÿ’ผ AU-6 (8) FULL TEXT ANALYSIS OF PRIVILEGED COMMANDS
ย ย ย ย ๐Ÿ’ผ AU-6 (9) CORRELATION WITH INFORMATION FROM NONTECHNICAL SOURCES
ย ย ย ย ๐Ÿ’ผ AU-6 (10) AUDIT LEVEL ADJUSTMENT
๐Ÿ’ผ AU-7 AUDIT REDUCTION AND REPORT GENERATION2
ย ย ย ย ๐Ÿ’ผ AU-7 (1) AUTOMATIC PROCESSING
ย ย ย ย ๐Ÿ’ผ AU-7 (2) AUTOMATIC SORT AND SEARCH
๐Ÿ’ผ AU-8 TIME STAMPS2
ย ย ย ย ๐Ÿ’ผ AU-8 (1) SYNCHRONIZATION WITH AUTHORITATIVE TIME SOURCE
ย ย ย ย ๐Ÿ’ผ AU-8 (2) SECONDARY AUTHORITATIVE TIME SOURCE
๐Ÿ’ผ AU-9 PROTECTION OF AUDIT INFORMATION6
ย ย ย ย ๐Ÿ’ผ AU-9 (1) HARDWARE WRITE-ONCE MEDIA
ย ย ย ย ๐Ÿ’ผ AU-9 (2) AUDIT BACKUP ON SEPARATE PHYSICAL SYSTEMS _ COMPONENTS
ย ย ย ย ๐Ÿ’ผ AU-9 (3) CRYPTOGRAPHIC PROTECTION
ย ย ย ย ๐Ÿ’ผ AU-9 (4) ACCESS BY SUBSET OF PRIVILEGED USERS
ย ย ย ย ๐Ÿ’ผ AU-9 (5) DUAL AUTHORIZATION
ย ย ย ย ๐Ÿ’ผ AU-9 (6) READ ONLY ACCESS
๐Ÿ’ผ AU-10 NON-REPUDIATION511
ย ย ย ย ๐Ÿ’ผ AU-10 (1) ASSOCIATION OF IDENTITIES
ย ย ย ย ๐Ÿ’ผ AU-10 (2) VALIDATE BINDING OF INFORMATION PRODUCER IDENTITY
ย ย ย ย ๐Ÿ’ผ AU-10 (3) CHAIN OF CUSTODY
ย ย ย ย ๐Ÿ’ผ AU-10 (4) VALIDATE BINDING OF INFORMATION REVIEWER IDENTITY
ย ย ย ย ๐Ÿ’ผ AU-10 (5) DIGITAL SIGNATURES
๐Ÿ’ผ AU-11 AUDIT RECORD RETENTION111
ย ย ย ย ๐Ÿ’ผ AU-11 (1) LONG-TERM RETRIEVAL CAPABILITY
๐Ÿ’ผ AU-12 AUDIT GENERATION3
ย ย ย ย ๐Ÿ’ผ AU-12 (1) SYSTEM-WIDE _ TIME-CORRELATED AUDIT TRAIL
ย ย ย ย ๐Ÿ’ผ AU-12 (2) STANDARDIZED FORMATS
ย ย ย ย ๐Ÿ’ผ AU-12 (3) CHANGES BY AUTHORIZED INDIVIDUALS
๐Ÿ’ผ AU-13 MONITORING FOR INFORMATION DISCLOSURE2
ย ย ย ย ๐Ÿ’ผ AU-13 (1) USE OF AUTOMATED TOOLS
ย ย ย ย ๐Ÿ’ผ AU-13 (2) REVIEW OF MONITORED SITES
๐Ÿ’ผ AU-14 SESSION AUDIT3
ย ย ย ย ๐Ÿ’ผ AU-14 (1) SYSTEM START-UP
ย ย ย ย ๐Ÿ’ผ AU-14 (2) CAPTURE_RECORD AND LOG CONTENT
ย ย ย ย ๐Ÿ’ผ AU-14 (3) REMOTE VIEWING _ LISTENING
๐Ÿ’ผ AU-15 ALTERNATE AUDIT CAPABILITY
๐Ÿ’ผ AU-16 CROSS-ORGANIZATIONAL AUDITING2
ย ย ย ย ๐Ÿ’ผ AU-16 (1) IDENTITY PRESERVATION
ย ย ย ย ๐Ÿ’ผ AU-16 (2) SHARING OF AUDIT INFORMATION