03.03.08: Protection of Audit Information

Control Familly: Audit and Accountability

SPRS: N/A

Top Ten Failed Requirement: N/A

Supporting Publications:

  • SP 800-92 [35]

Referenced in: N/A

Control Type: N/A

CPCSC Level 2: 03.03.08

CMMC Level(s): N/A

Derived From: NIST SP 800-53r5

  • AU-09

  • AU-09(04)

a. Protect audit information and audit logging tools from unauthorized access, modification, and deletion.

b. Authorize access to management of audit logging functionality to only a subset of privileged users or roles.

Discussion:

Audit information includes the information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and personally identifiable information. Audit logging tools are programs and devices used to conduct audit and logging activities. The protection of audit information focuses on technical protection and limits the ability to access and execute audit logging tools to authorized individuals. The physical protection of audit information is addressed by media and physical protection requirements.

Individuals or roles with privileged access to a system and who are also the subject of an audit by that system may affect the reliability of the audit information by inhibiting audit activities or modifying audit records. Requiring privileged access to be further defined between audit-related privileges and other privileges limits the number of users or roles with audit-related privileges.

Assessment Methods and Objectives

Examine [SELECT FROM: audit and accountability policy and procedures; access control policy and procedures; procedures for the protection of audit information; system configuration settings; system audit records; audit tools; system-generated list of privileged users with access to the management of audit functionality; access authorizations; access control list; system design documentation; system security plan; other relevant documents or records]

Interview [SELECT FROM: personnel with audit and accountability responsibilities; personnel with information security responsibilities; system developers; system administrators]

Test [SELECT FROM: mechanisms for implementing audit information protection; mechanisms for managing access to audit functionality]

NIST SP 800-171A r3 Determining Statements Determine if:

A.03.03.08.a[01]: audit information is protected from unauthorized access, modification, and deletion.

A.03.03.08.a[02]: audit logging tools are protected from unauthorized access, modification, and deletion.

A.03.03.08.b: access to management of audit logging functionality is authorized to only a subset of privileged users or roles.