Information
By managing security logs, you can also track changes. These might include planned changes, which are part of the organization's change control process (sometimes referred to as MACD-Move/Add/Change/Delete), ad hoc changes, or unexpected changes, such as incidents.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
For critical applications, all Add, Change/Modify, and Delete activities or transactions must generate a log entry. Each log entry should contain the following information:
-User identification information
-Type of event
-Date and time stamp
-Success or failure indication
-Origination of event
-Identity or name of affected data, system component, or resource
Item Details
Category: AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY
References: 800-53|AU-1, 800-53|AU-2, 800-53|AU-3, 800-53|AU-4, 800-53|AU-5, 800-53|AU-6, 800-53|AU-7, 800-53|AU-9, 800-53|AU-11, 800-53|AU-12, 800-53|AU-14, 800-53|SI-4
Control ID: d9a4fa5639647ccb13b8000f2a6d6be03cc96dc8104f08b9fb5f9255920f5bcc