Skip to content

The ISSO must review audit trails periodically based on system documentation recommendations or immediately upon system security events.

An XCCDF Rule

Description

<VulnDiscussion>Without access control the data is not secure. It can be compromised, misused, or changed by unauthorized access at any time.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-222622r879887_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

Establish a scheduled process for reviewing logs.

Maintain a log or records of dates and times audit logs are reviewed.