UCF STIG Viewer Logo

AU-6 AUDIT REVIEW, ANALYSIS, AND REPORTING


Overview

Number Title Impact Priority Subject Area
AU-6 Audit Review, Analysis, And Reporting LOW P1 Audit And Accountability

Instructions
The organization:
AU-6a.
Reviews and analyzes information system audit records Assignment: organization-defined frequency for indications of Assignment: organization-defined inappropriate or unusual activity; and
AU-6b.
Reports findings to Assignment: organization-defined personnel or roles.
Guidance
Audit review, analysis, and reporting covers information security-related auditing performed by organizations including, for example, auditing that results from monitoring of account usage, remote access, wireless connectivity, mobile device connection, configuration settings, system component inventory, use of maintenance tools and nonlocal maintenance, physical access, temperature and humidity, equipment delivery and removal, communications at the information system boundaries, use of mobile code, and use of VoIP. Findings can be reported to organizational entities that include, for example, incident response team, help desk, information security group/department. If organizations are prohibited from reviewing and analyzing audit information or unable to conduct such activities (e.g., in certain national security applications or systems), the review/analysis may be carried out by other organizations granted such authority.

Enhancements
AU-6 (1) Process Integration MODERATE
Organizational processes benefiting from integrated audit review, analysis, and reporting include, for example, incident response, continuous monitoring, contingency planning, and Inspector General audits.

The organization employs automated mechanisms to integrate audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities.

AU-6 (2) Automated Security Alerts

Withdrawn: Incorporated into SI-4.

AU-6 (3) Correlate Audit Repositories MODERATE
Organization-wide situational awareness includes awareness across all three tiers of risk management (i.e., organizational, mission/business process, and information system) and supports cross-organization awareness.

The organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness.

AU-6 (4) Central Review And Analysis
Automated mechanisms for centralized reviews and analyses include, for example, Security Information Management products.

The information system provides the capability to centrally review and analyze audit records from multiple components within the system.

AU-6 (5) Integration / Scanning And Monitoring Capabilities HIGH
This control enhancement does not require vulnerability scanning, the generation of performance data, or information system monitoring. Rather, the enhancement requires that the analysis of information being otherwise produced in these areas is integrated with the analysis of audit information. Security Event and Information Management System tools can facilitate audit record aggregation/consolidation from multiple information system components as well as audit record correlation and analysis. The use of standardized audit record analysis scripts developed by organizations (with localized script adjustments, as necessary) provides more cost-effective approaches for analyzing audit record information collected. The correlation of audit record information with vulnerability scanning information is important in determining the veracity of vulnerability scans and correlating attack detection events with scanning results. Correlation with performance data can help uncover denial of service attacks or cyber attacks resulting in unauthorized use of resources. Correlation with system monitoring information can assist in uncovering attacks and in better relating audit information to operational situations.

The organization integrates analysis of audit records with analysis of Selection (one or more): vulnerability scanning information; performance data; information system monitoring information; Assignment: organization-defined data/information collected from other sources to further enhance the ability to identify inappropriate or unusual activity.

AU-6 (6) Correlation With Physical Monitoring HIGH
The correlation of physical audit information and audit logs from information systems may assist organizations in identifying examples of suspicious behavior or supporting evidence of such behavior. For example, the correlation of an individual�s identity for logical access to certain information systems with the additional physical security information that the individual was actually present at the facility when the logical access occurred, may prove to be useful in investigations.

The organization correlates information from audit records with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity.

AU-6 (7) Permitted Actions
Organizations specify permitted actions for information system processes, roles, and/or users associated with the review, analysis, and reporting of audit records through account management techniques. Specifying permitted actions on audit information is a way to enforce the principle of least privilege. Permitted actions are enforced by the information system and include, for example, read, write, execute, append, and delete.

The organization specifies the permitted actions for each Selection (one or more): information system process; role; user associated with the review, analysis, and reporting of audit information.

AU-6 (8) Full Text Analysis Of Privileged Commands
This control enhancement requires a distinct environment for the dedicated analysis of audit information related to privileged users without compromising such information on the information system where the users have elevated privileges including the capability to execute privileged commands. Full text analysis refers to analysis that considers the full text of privileged commands (i.e., commands and all parameters) as opposed to analysis that considers only the name of the command. Full text analysis includes, for example, the use of pattern matching and heuristics.

The organization performs a full text analysis of audited privileged commands in a physically distinct component or subsystem of the information system, or other information system that is dedicated to that analysis.

AU-6 (9) Correlation With Information From Nontechnical Sources
Nontechnical sources include, for example, human resources records documenting organizational policy violations (e.g., sexual harassment incidents, improper use of organizational information assets). Such information can lead organizations to a more directed analytical effort to detect potential malicious insider activity. Due to the sensitive nature of the information available from nontechnical sources, organizations limit access to such information to minimize the potential for the inadvertent release of privacy-related information to individuals that do not have a need to know. Thus, correlation of information from nontechnical sources with audit information generally occurs only when individuals are suspected of being involved in a security incident. Organizations obtain legal advice prior to initiating such actions.

The organization correlates information from nontechnical sources with audit information to enhance organization-wide situational awareness.

AU-6 (10) Audit Level Adjustment
The frequency, scope, and/or depth of the audit review, analysis, and reporting may be adjusted to meet organizational needs based on new information received.

The organization adjusts the level of audit review, analysis, and reporting within the information system when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information.