Managing Logs for Critical Transactions

Information

By managing security logs, you can also track changes. These might include planned changes, which are part of the organization's change control process (sometimes referred to as MACD-Move/Add/Change/Delete), ad hoc changes, or unexpected changes, such as incidents.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

For critical applications, all Add, Change/Modify, and Delete activities or transactions must generate a log entry. Each log entry should contain the following information:
-User identification information
-Type of event
-Date and time stamp
-Success or failure indication
-Origination of event
-Identity or name of affected data, system component, or resource

See Also

https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf

Item Details

Category: AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AU-1, 800-53|AU-2, 800-53|AU-3, 800-53|AU-4, 800-53|AU-5, 800-53|AU-6, 800-53|AU-7, 800-53|AU-9, 800-53|AU-11, 800-53|AU-12, 800-53|AU-14, 800-53|SI-4

Plugin: amazon_aws

Control ID: d9a4fa5639647ccb13b8000f2a6d6be03cc96dc8104f08b9fb5f9255920f5bcc