AU-02 Auditable Events

Audit and Accountability

Low Moderate High Privacy

Description

The information system generates audit records for the following events: [Assignment: organization-defined auditable events].

Supplemental Guidance

The purpose of this control is to identify important events which need to be audited as significant and relevant to the security of the information system. The organization specifies which information system components carry out auditing activities. Auditing activity can affect information system performance. Therefore, the organization decides, based upon a risk assessment, which events require auditing on a continuous basis and which events require auditing in response to specific situations. Audit records can be generated at various levels of abstraction, including at the packet level as information traverses the network. Selecting the right level of abstraction for audit record generation is a critical aspect of an audit capability and can facilitate the identification of root causes to problems. Additionally, the security audit function is coordinated with the network health and status monitoring function to enhance the mutual support between the two functions by the selection of information to be recorded by each function. The checklists and configuration guides at http://csrc.nist.gov/pcig/cig.html provide recommended lists of auditable events. The organization defines auditable events that are adequate to support after- the-fact investigations of security incidents. NIST Special Publication 800-92 provides guidance on computer security log management.

Changes from Rev 4

Title changed for 'Audit Events' Changes parameter regarding the specific types of events that the system is capable of logging Requires the review and update the event types selected for logging at a specific frequency Incorporates withdrawn control AU-02(3) Incorporates audit elements of withdrawn App J control UL-02

Compliance Mappings

ISO 27001:2022

7.5A.8.15

ISO 27002:2022

8.15

COBIT 2019

DSS06

CIS Controls v8

CIS 3.14CIS 8CIS 8.1CIS 8.12CIS 8.2CIS 8.6CIS 8.7CIS 8.8

NIST CSF 2.0

PR.PS-04

SOC 2 TSC

CC6.1-POF7CC6.7-POF1CC7.1CC7.1-POF1CC7.2CC7.2-POF1CC7.3CC8.1PI1.4

PCI DSS v4.0.1

10.2

CSA CCM v4

CEK-09LOG-01LOG-07LOG-08LOG-10LOG-11LOG-12

CSA AICM v1

CEK-09DSP-24LOG-01LOG-07LOG-08LOG-10LOG-11LOG-12LOG-14LOG-15

FINOS CCC

CCC-C04CCC-C17

ISO 42001:2023

A.6.2.8

IEC 62443

3-3 SR 2.8

MAS TRM

15

APRA CPS 234

Para 22-23

ASD Essential Eight

E8-1 ML2

BSI IT-Grundschutz

OPS.1.1.5

ANSSI

Hygiene.29SecNumCloud.13.7

FINMA Circular 2023/1

IV.C(66)IV.C(67)IV.C(68)

OSFI B-13

B-13.3.3

EU GDPR

Art.30(1)(g)Art.33(3)Art.5(2)Art.7(1)

EU DORA

Art.10(1)Art.10(2)

BIO2

8.15

RBI CSF

Annex1.16Annex1.17ITGRCA.15

FISC Security Guidelines

FISC.O11FISC.O2FISC.O7FISC.T11

LGPD + BCB 4893

BCB.Art.20BCB.Art.6LGPD.Art.42-45LGPD.Art.6LGPD.Art.8

HKMA TM-E-1

TME1.10.3TME1.11.2TME1.4.2TME1.5.2TME1.8.2

MLPS 2.0

8.1.3.58.1.4.38.1.5.18.2

EU CRA

CRA.I.2dCRA.I.2l

SWIFT CSCF

SWIFT.1.2SWIFT.2.9SWIFT.5.4SWIFT.6.4

NCA ECC

2-12

UAE IA

T7

CBB TM

TM-12

Qatar NIA

OS

CBUAE

CR-3

CBE CSF

CD-1CTO-5

SA JS2

JS2-7.3

CBN CSF

Part3.5

BoG CISD

CISD-VII

POPIA

s17s19s8

BoM CTRM

3.134.2

IOSCO Cyber Resilience

DET-1

BCBS 239

Principle 3Principle 4

CPMI-IOSCO PFMI

CG.DEPFMI.P17

FFIEC IS

II.C.15II.C.18III.B

NYDFS 500

500.6

HIPAA Security Rule

§164.308(a)(1)(ii)(D)§164.308(a)(5)(ii)(C)§164.312(b)

ECB CROE

CROE.2.4

EBA ICT Guidelines

3.4.53.5(c)

SEBI CSCRF

DE.AU

BOT Cyber Resilience

Ch3.1Ch6.1

CMMC 2.0

AU

NERC CIP

CIP-007-6

10 CFR 73.54

RG5.71-A-AU

TSA Pipeline SD

SD-2 Sec C

IEEE 1686-2022

5.2

DOE C2M2 v2.1

SITUATION

API 1164

Sec 9

AWIA

AWWA Sec 5

IAEA NSS 17-T

Sec 5.5

PCI PTS v6

L

TIBER-EU

TIBER.BT

PCI HSM

68

Common Criteria

CC Part 2 — FAU

ISAE 3402

Clause 4

Solvency II

Pillar3-Reporting

Lloyd's Minimum Standards

MS13.2MS2.1MS5.1MS8.12

NAIC Insurance Data Security

4-audit4B

PRA SS1/23

P-IT.2P3.2P3.4P4.3P4.4

FCA SYSC 13

SYSC 13.7.5

HITRUST CSF v11

09.g

FDA 21 CFR Part 11

§11.10(e)§11.50

FDA Cybersecurity Guidance

SA-5

ISO 27799

12.49.2H.4H.5

OWASP MASVS v2.1

MASVS-STORAGE-2

CCSS v9.0

1.05.22.04.1

MiCA

Art.68(1)Art.69(1)Art.70(1)Art.72(1)Art.86(1)Art.88(1)Art.92(1)

Basel SCO60

SCO60.50SCO60.55SCO60.62SCO60.66SCO60.73

BSSC Standards

NOS-06GSP-10GSP-12

SEC Custody (Digital Assets)

SEC-CD-04SEC-CD-05SEC-CD-07SEC-CD-13SEC-CD-15SEC-CD-18SEC-CD-20

ISO 17799 (legacy)

10.10.1

COBIT 4.1 (legacy)

AI2.3