IHI Table1: Difference between revisions
Jump to navigation
Jump to search
Programsam (talk | contribs) No edit summary |
Programsam (talk | contribs) No edit summary |
||
| Line 39: | Line 39: | ||
| | | | ||
| Y | | Y | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| Session timeout | | Session timeout | ||
| | | | ||
| Line 46: | Line 46: | ||
| | | | ||
| Y | | Y | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| Account lockout | | Account lockout | ||
| | | | ||
| Line 53: | Line 53: | ||
| | | | ||
| Y | | Y | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| Create data | | Create data | ||
| X | | X | ||
| Line 60: | Line 60: | ||
| | | | ||
| Y | | Y | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| Update data | | Update data | ||
| X | | X | ||
| Line 67: | Line 67: | ||
| | | | ||
| Y | | Y | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| Delete data | | Delete data | ||
| X | | X | ||
| Line 74: | Line 74: | ||
| | | | ||
| Y | | Y | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| Query data | | Query data | ||
| | | | ||
| Line 89: | Line 88: | ||
| | | | ||
| N | | N | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| Signature created/validated | | Signature created/validated | ||
| | | | ||
| Line 96: | Line 95: | ||
| | | | ||
| Y | | Y | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| Export data | | Export data | ||
| | | | ||
| Line 103: | Line 102: | ||
| | | | ||
| Y | | Y | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| Import data | | Import data | ||
| | | | ||
| Line 124: | Line 123: | ||
| | | | ||
| N | | N | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| System backup | | System backup | ||
| X | | X | ||
| Line 131: | Line 130: | ||
| | | | ||
| Y | | Y | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| System restore | | System restore | ||
| | | | ||
| Line 153: | Line 152: | ||
| X | | X | ||
| N | | N | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| Grant access rights | | Grant access rights | ||
| X | | X | ||
| Line 160: | Line 159: | ||
| X | | X | ||
| Y | | Y | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| Modify access rights | | Modify access rights | ||
| X | | X | ||
| Line 167: | Line 166: | ||
| X | | X | ||
| Y | | Y | ||
|- | |- style="font-weight: bold; background-color: #EEEEEE" | ||
| Revoke access rights | | Revoke access rights | ||
| X | | X | ||
Revision as of 22:24, 5 January 2014
| Auditable Events | Source of Software Audit mechanism Checklist | Affects User-based Non-repudiation | ||||
|---|---|---|---|---|---|---|
| Log Entry Item | Chuvakin and Peterson[3] | CCHIT[2] | SANS[7] | IEEE[6] | Yes or No | |
| System startup | X | X | X | N | ||
| System shutdown | X | X | X | N | ||
| System restart | X | N | ||||
| User login/logout | X | X | X | Y | ||
| Session timeout | X | Y | ||||
| Account lockout | X | Y | ||||
| Create data | X | X | X | Y | ||
| Update data | X | X | X | Y | ||
| Delete data | X | X | X | Y | ||
| Query data | X | Y | ||||
| Node-authentication failure | X | X | X | N | ||
| Signature created/validated | X | Y | ||||
| Export data | X | Y | ||||
| Import data | X | Y | ||||
| Security administration event | X | X | X | X | N | |
| Scheduling | X | N | ||||
| System backup | X | X | Y | |||
| System restore | X | Y | ||||
| Initiate a network connection | X | X | X | N | ||
| Accept a network connection | X | X | N | |||
| Grant access rights | X | X | X | Y | ||
| Modify access rights | X | X | X | Y | ||
| Revoke access rights | X | X | X | Y | ||
| System, network, or services changes | X | X | X | N | ||
| Application process abort/failure/abnormal end | X | X | N | |||
| Detection of malicious activity | X | X | N | |||
| Changes to audit log configuration | X | N | ||||