IHI Table1: Difference between revisions

From Ben Works
Jump to navigation Jump to search
No edit summary
Blanked the page
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
{| class="wikitable" style="text-align: left; width: 100%;"
 
|+ Table 1. A comparison of auditable events by source, with a categorization of events affecting user-based non-repudiation
! Auditable Events
! colspan=4 | Source of Software Audit mechanism Checklist
! Affects User-based Non-repudiation
|-
| ''Log Entry Item''
| ''Chuvakin and Peterson<sup>[3]</sup>''
| ''CCHIT<sup>[2]</sup>''
| ''SANS<sup>[7]</sup>''
| ''IEEE<sup>[6]</sup>''
| ''Yes or No''
|-
| System startup
| X
| X
| X
|
| N
|-
| System shutdown
| X
| X
| X
|
| N
|-
| System restart
|
|
| X
|
| N
|- style="font-weight: bold; background-color: #EEEEEE"
| User login/logout
| X
| X
| X
|
| Y
|-  style="font-weight: bold; background-color: #EEEEEE"
| Session timeout
|
| X
|
|
| Y
|-  style="font-weight: bold; background-color: #EEEEEE"
| Account lockout
|
| X
|
|
| Y
|-  style="font-weight: bold; background-color: #EEEEEE"
| Create data
| X
| X
| X
|
| Y
|-  style="font-weight: bold; background-color: #EEEEEE"
| Update data
| X
| X
| X
|
| Y
|-  style="font-weight: bold; background-color: #EEEEEE"
| Delete data
| X
| X
| X
|
| Y
|-  style="font-weight: bold; background-color: #EEEEEE"
| Query data
|
| X
|
|
| Y
|-
| Node-authentication failure
| X
| X
| X
|
| N
|-  style="font-weight: bold; background-color: #EEEEEE"
| Signature created/validated
|
| X
|
| Y
|-  style="font-weight: bold; background-color: #EEEEEE"
| Export data
|
| X
|
|
| Y
|-  style="font-weight: bold; background-color: #EEEEEE"
| Import data
|
| X
|
|
| Y
|-
| Security administration event
| X
| X
| X
| X
| N
|-
| Scheduling
|
| X
|
|
| N
|-  style="font-weight: bold; background-color: #EEEEEE"
| System backup
| X
| X
|
|
| Y
|-  style="font-weight: bold; background-color: #EEEEEE"
| System restore
|
| X
|
|
|
| Y
|-
| Initiate a network connection
| X
|
| X
| X
| N
|-
| Accept a network connection
|
|
| X
| X
| N
|-  style="font-weight: bold; background-color: #EEEEEE"
| Grant access rights
| X
|
| X
| X
| Y
|-  style="font-weight: bold; background-color: #EEEEEE"
| Modify access rights
| X
|
| X
| X
| Y
|-  style="font-weight: bold; background-color: #EEEEEE"
| Revoke access rights
| X
|
| X
| X
| Y
|-
| System, network, or services changes
| X
|
| X
| X
| N
|-
| Application process abort/failure/abnormal end
| X
|
| X
|
| N
|-
| Detection of malicious activity
| X
|
| X
|
| N
|-
| Changes to audit log configuration
|
|
|
| X
| N
|}

Latest revision as of 22:32, 5 January 2014