|
|
| Line 1: |
Line 1: |
| {| class="wikitable" style="text-align: left; width: 100%;"
| | |
| |+ Table 1. A comparison of auditable events by source, with a categorization of events affecting user-based non-repudiation
| |
| ! Auditable Events
| |
| ! colspan=4 | Source of Software Audit mechanism Checklist
| |
| ! Affects User-based Non-repudiation
| |
| |-
| |
| | ''Log Entry Item''
| |
| | ''Chuvakin and Peterson<sup>[3]</sup>''
| |
| | ''CCHIT<sup>[2]</sup>''
| |
| | ''SANS<sup>[7]</sup>''
| |
| | ''IEEE<sup>[6]</sup>''
| |
| | ''(Yes or No)''
| |
| |-
| |
| | System startup
| |
| | X
| |
| | X
| |
| | X
| |
| |
| |
| | N
| |
| |-
| |
| | System shutdown
| |
| | X
| |
| | X
| |
| | X
| |
| |
| |
| | N
| |
| |-
| |
| | System restart
| |
| |
| |
| |
| |
| | X
| |
| |
| |
| | N
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | User login/logout
| |
| | X
| |
| | X
| |
| | X
| |
| |
| |
| | Y
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | Session timeout
| |
| |
| |
| | X
| |
| |
| |
| |
| |
| | Y
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | Account lockout
| |
| |
| |
| | X
| |
| |
| |
| |
| |
| | Y
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | Create data
| |
| | X
| |
| | X
| |
| | X
| |
| |
| |
| | Y
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | Update data
| |
| | X
| |
| | X
| |
| | X
| |
| |
| |
| | Y
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | Delete data
| |
| | X
| |
| | X
| |
| | X
| |
| |
| |
| | Y
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | View data
| |
| | X
| |
| | X
| |
| | X
| |
| |
| |
| | Y
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | Query data
| |
| |
| |
| | X
| |
| |
| |
| |
| |
| | Y
| |
| |-
| |
| | Node-authentication failure
| |
| | X
| |
| | X
| |
| | X
| |
| |
| |
| | N
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | Signature created/validated
| |
| |
| |
| | X
| |
| |
| |
| |
| |
| | Y
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | Export data
| |
| |
| |
| | X
| |
| |
| |
| |
| |
| | Y
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | Import data
| |
| |
| |
| | X
| |
| |
| |
| |
| |
| | Y
| |
| |-
| |
| | Security administration event
| |
| | X
| |
| | X
| |
| | X
| |
| | X
| |
| | N
| |
| |-
| |
| | Scheduling
| |
| |
| |
| | X
| |
| |
| |
| |
| |
| | N
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | System backup
| |
| | X
| |
| | X
| |
| |
| |
| |
| |
| | Y
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | System restore
| |
| |
| |
| | X
| |
| |
| |
| |
| |
| | Y
| |
| |-
| |
| | Initiate a network connection
| |
| | X
| |
| |
| |
| | X
| |
| | X
| |
| | N
| |
| |-
| |
| | Accept a network connection
| |
| |
| |
| |
| |
| | X
| |
| | X
| |
| | N
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | Grant access rights
| |
| | X
| |
| |
| |
| | X
| |
| | X
| |
| | Y
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | Modify access rights
| |
| | X
| |
| |
| |
| | X
| |
| | X
| |
| | Y
| |
| |- style="font-weight: bold; background-color: #EEEEEE"
| |
| | Revoke access rights
| |
| | X
| |
| |
| |
| | X
| |
| | X
| |
| | Y
| |
| |-
| |
| | System, network, or services changes
| |
| | X
| |
| |
| |
| | X
| |
| | X
| |
| | N
| |
| |-
| |
| | Application process abort/failure/abnormal end
| |
| | X
| |
| |
| |
| | X
| |
| |
| |
| | N
| |
| |-
| |
| | Detection of malicious activity
| |
| | X
| |
| |
| |
| | X
| |
| |
| |
| | N
| |
| |-
| |
| | Changes to audit log configuration
| |
| |
| |
| |
| |
| |
| |
| | X
| |
| | N
| |
| |}
| |