IHI Table1: Difference between revisions

From Ben Works
Jump to navigation Jump to search
No edit summary
No edit summary
Line 39: Line 39:
|
|
| Y
| Y
|-
|- style="font-weight: bold; background-color: #EEEEEE"
| Session timeout
| Session timeout
|  
|  
Line 46: Line 46:
|  
|  
| Y
| Y
|-
|- style="font-weight: bold; background-color: #EEEEEE"
| Account lockout
| Account lockout
|  
|  
Line 53: Line 53:
|  
|  
| Y
| Y
|-
|- style="font-weight: bold; background-color: #EEEEEE"
| Create data
| Create data
| X
| X
Line 60: Line 60:
|  
|  
| Y
| Y
|-
|- style="font-weight: bold; background-color: #EEEEEE"
| Update data
| Update data
| X
| X
Line 67: Line 67:
|  
|  
| Y
| Y
|-
|- style="font-weight: bold; background-color: #EEEEEE"
| Delete data
| Delete data
| X
| X
Line 74: Line 74:
|  
|  
| Y
| Y
|-  
|- style="font-weight: bold; background-color: #EEEEEE"
|-
| Query data
| Query data
|  
|  
Line 89: Line 88:
|
|
| N
| N
|-
|- style="font-weight: bold; background-color: #EEEEEE"
| Signature created/validated
| Signature created/validated
|
|
Line 96: Line 95:
|
|
| Y
| Y
|-
|- style="font-weight: bold; background-color: #EEEEEE"
| Export data
| Export data
|  
|  
Line 103: Line 102:
|  
|  
| Y
| Y
|-
|- style="font-weight: bold; background-color: #EEEEEE"
| Import data
| Import data
|  
|  
Line 124: Line 123:
|
|
| N
| N
|-
|- style="font-weight: bold; background-color: #EEEEEE"
| System backup
| System backup
| X
| X
Line 131: Line 130:
|
|
| Y
| Y
|-
|- style="font-weight: bold; background-color: #EEEEEE"
| System restore
| System restore
|  
|  
Line 153: Line 152:
| X
| X
| N
| N
|-
|- style="font-weight: bold; background-color: #EEEEEE"
| Grant access rights
| Grant access rights
| X
| X
Line 160: Line 159:
| X
| X
| Y  
| Y  
|-
|- style="font-weight: bold; background-color: #EEEEEE"
| Modify access rights
| Modify access rights
| X
| X
Line 167: Line 166:
| X
| X
| Y
| Y
|-
|- style="font-weight: bold; background-color: #EEEEEE"
| Revoke access rights
| Revoke access rights
| X
| X

Revision as of 22:24, 5 January 2014

Table 1. A comparison of auditable events by source, with a categorization of events affecting user-based non-repudiation
Auditable Events Source of Software Audit mechanism Checklist Affects User-based Non-repudiation
Log Entry Item Chuvakin and Peterson[3] CCHIT[2] SANS[7] IEEE[6] Yes or No
System startup X X X N
System shutdown X X X N
System restart X N
User login/logout X X X Y
Session timeout X Y
Account lockout X Y
Create data X X X Y
Update data X X X Y
Delete data X X X Y
Query data X Y
Node-authentication failure X X X N
Signature created/validated X Y
Export data X Y
Import data X Y
Security administration event X X X X N
Scheduling X N
System backup X X Y
System restore X Y
Initiate a network connection X X X N
Accept a network connection X X N
Grant access rights X X X Y
Modify access rights X X X Y
Revoke access rights X X X Y
System, network, or services changes X X X N
Application process abort/failure/abnormal end X X N
Detection of malicious activity X X N
Changes to audit log configuration X N