Information system auditing capability is critical for accurate forensic analysis. Audit record content that may be necessary to satisfy the requirement of this control includes, but is not limited to, time stamps, source and destination IP addresses, user/process identifiers, event descriptions, application specific events, success/fail indications, filenames involved, access control or flow control rules invoked.
Without information establishing the source of activity, the value of audit records from a forensics perspective is questionable.
Examples of activity sources include, but are not limited to, application process sources such as one process affecting another process, user related activity, and activity resulting from remote network system access (IP addresses).
|