The ISSO must review audit trails periodically based on system documentation recommendations or immediately upon system security events.
An XCCDF Rule
Description
<VulnDiscussion>Without access control the data is not secure. It can be compromised, misused, or changed by unauthorized access at any time.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-222622r879887_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
Establish a scheduled process for reviewing logs.
Maintain a log or records of dates and times audit logs are reviewed.