The following events shall be logged:
-
Successful and unsuccessful system log-on attempts.
-
Successful and unsuccessful attempts to use:
- access permission on a user account, file, directory or other system resource;
- create permission on a user account, file, directory or other system resource;
- write permission on a user account, file, directory or other system resource;
- delete permission on a user account, file, directory or other system resource;
- change permission on a user account, file, directory or other system resource.
-
Successful and unsuccessful attempts to change account passwords.
-
Successful and unsuccessful actions by privileged accounts.
-
Successful and unsuccessful attempts for users to:
- access the audit log file;
- modify the audit log file;
- destroy the audit log file.
The following content shall be included with every audited event:
- Date and time of the event.
- The component of the information system (e.g., software component, hardware component) where the event occurred.
- Type of event.
- User/subject identity.
- Outcome (success or failure) of the event.