SKIP TO PAGE CONTENT

AU-12 Audit Record Generation

Last Review: 10/1/22

Statement

All West Texas A&M University information resources must be capable of auditing actions of users deemed necessary by the Information Security Officer (ISO).

Applicability

This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.

Implementation

  • Custodians shall ensure systems are configured to provide audit record generation capability for the list of auditable events defined in AU-2 on systems within their control including but not limited to end user devices (desktop or laptop computers), servers, and network components (switches, routers, firewalls, wireless access points).
  • Custodians shall work with the security office to determine which auditable events are to be audited by specific components of the information system
  • Custodians shall ensure systems generate audit records for the events defined in AU-2 with the content defined in AU-3.

 

Phone
Twitter
Facebook
Instagram
Mail