💼 AU-9 Protection of Audit Information
- ID:
/frameworks/nist-sp-800-53-r5/au/09
Description
a. Protect audit information and audit logging tools from unauthorized access, modification, and deletion; and b. Alert [Assignment: organization-defined personnel or roles] upon detection of unauthorized access, modification, or deletion of audit information.
Similar
- Sections
/frameworks/aws-fsbp-v1.0.0/cloudtrail/02/frameworks/aws-fsbp-v1.0.0/cloudtrail/04
- Internal
- ID:
dec-c-b292bd51
- ID:
Similar Sections (Take Policies From)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [CloudTrail.2] CloudTrail should have encryption at-rest enabled | 1 | no data | |||
| 💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [CloudTrail.4] CloudTrail log file validation should be enabled | 1 | 1 | no data |
Similar Sections (Give Policies To)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 FedRAMP High Security Controls → 💼 AU-9 Protection of Audit Information (L)(M)(H) | 3 | 8 | 11 | no data | |
| 💼 FedRAMP Low Security Controls → 💼 AU-9 Protection of Audit Information (L)(M)(H) | 10 | no data | |||
| 💼 NIST CSF v2.0 → 💼 PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected | 142 | no data |
Sub Sections
Policies (2)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ AWS CloudTrail is not encrypted with KMS CMK🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudTrail Log File Validation is not enabled🟢 | 1 | 🟢 x6 | no data |