SKIP TO PAGE CONTENT

AU-12 Audit Record Generation

Initial Implementation: 10/1/2022
Last Review: 10/8/2025

Statement

All West Texas A&M University information resources must be capable of auditing actions of users deemed necessary by the Information Security Officer (ISO), who selects the event types that are to be logged by specific components of the system.

Applicability

This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.

Implementation

  • Custodians shall ensure systems are configured to provide audit record generation capability for the list of auditable events defined in control AU-2 Event Logging on systems within their control including but not limited to end user devices (desktop or laptop computers), servers, and network components (switches, routers, firewalls, wireless access points).
  • Custodians shall work with the security office to determine which auditable events are to be audited by specific components of the information system
  • Custodians shall ensure systems generate audit records for the events defined in control AU-2 Event Logging with the content defined in control AU-3 Content of Audit Records.

 

Phone
Twitter
Facebook
Instagram
Mail