Tools are available for the review of audit records and for report generation from audit records.
MAC / CONF | Impact | Subject Area |
---|---|---|
MACI MACII MACIII | Low | Enclave Computing Environment |
Threat |
---|
The amount of information in audit logs can be very large and extremely difficult to analyze manually; important security related events could be overlooked. Audit review tools are available that can query the audit records by user ID, date/time, or some other set of parameters to run reports of selected information. |
Guidance |
---|
1. Determine if an audit reduction capability exists. This capability can be either OS provided or an add-on product. 2. Operating systems and applications shall have the capability to review audit records and generate reports from the audit records. Most operating systems and applications have built-in auditing capabilities, but if they don’t, a DOD approved auditing utility shall be acquired. Selection of the individual approved software should be determined by auditing capabilities, ease of use, administrative overhead, and system overhead, as well as enterprise or organizational policy on auditing requirements. 3. Operating systems typically provide at least the minimum tools and utilities to review audit records and generate reports. Microsoft Windows event viewer tracks all security events and can selectively review audit records, and the Solaris operating system uses the ‘praudit’ utility for audit reviews. |