Policy information: IT-12 Audit and Accountability (AU) Standard
About This Standard
Status: Effective July 9, 2024
Responsible University Office: University Information Policy Office
Responsible University Administrator: Office of the Vice President for Information Technology and Chief Information Officer
Policy Contact: University Information Security Office uiso@iu.edu
Scope
This standard supports Policy IT-12 (Security of Information Technology Resources) and applies to all Indiana University information technology resources, regardless of whether those resources are managed by the university or provisioned from third parties on behalf of the university, and to all users of those resources regardless of affiliation.
Objectives
The key objectives of this standard are to ensure that:
- Information system audit records are created, protected, and retained to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity; and
- The actions of individual information system users can be uniquely traced to those users.
Most information technology has the capability to generate logs such as authentication logs, access logs, system logs, application logs, or service logs. Although different terms may be used for the logs generated by different parts of the technology stack, the concept remains the same. These logs are files that record observable occurrences, events, transactions, or activities that occur on an IT resource and are used for a variety of purposes including troubleshooting, system optimization, detecting unauthorized access or usage, incident investigations, or to meet compliance requirements.
Standard
The following tables detail baseline security controls for audit and accountability to be applied to a particular information technology resource based on its security categorization. Select controls as applicable. For example, all controls may not apply to every system component or technology, or to situations governed by specific regulations.
Control: | Event Logging | ||
Required for: | High | Moderate | Low |
IU Implementation |
Systems must have logs to support business operations, security, and incident response. Logs must at a minimum:
| ||
NIST Cross Reference | AU-2 |
Control: | Content of Audit Records | ||
Required for: | High | Moderate | Low |
IU Implementation | At a minimum, all logs must contain the following elements:
| ||
Notes | The above information is provided by metadata such as time stamps, source and destination addresses, user or process identifiers, success or failure indicators, and filenames involved. Unless otherwise required by contract, regulation, etc., logs must NOT contain the following kinds of information:
| ||
NIST Cross Reference | AU-3 |
Control: | Response to Audit Logging Process Failures | ||
Required for: | High& | Moderate | Low |
IU Implementation | Monitor the log process and notify the appropriate personnel to take appropriate action in the event of failure. | ||
Notes | Use of centrally provisioned, common IT infrastructure and services provided by UITS often fulfills many of these requirements. Check with the service owner for details. | ||
NIST Cross Reference | AU-5 |
Control: | Audit Log Record Review, Analysis, and Reporting | ||
Required for: | High | Moderate | Low |
IU Implementation |
| ||
Notes | Use automated log analysis and alerting for resources involving Critical and Restricted institutional data, and test the log automation every 90 days. (IDS Checklist row 41) | ||
NIST Cross Reference | AU-6 |
Control: | Time Stamps | ||
Required for: | High | Moderate | Low |
IU Implementation | Ensure that all log entries are time stamped, and that time stamps are synchronized with the university’s time servers or a trusted authoritative time source. | ||
Notes | Use of centrally provisioned, common IT infrastructure and services provided by UITS often fulfills many of these requirements. Check with the service owner for details. | ||
NIST Cross Reference | AU-8 |
Control: | Audit Log Record Retention | ||
Required for: | High | Moderate | Low |
IU Implementation | Retain logs for a minimum of 30 days (60 days recommended if practicable) or longer if necessary and in accordance with the Indiana University Records Retention Schedule to meet applicable regulatory requirements (e.g., PCI-DSS, HIPAA, etc.) and to support troubleshooting, audits, and incident response. Be sure to allocate sufficient log storage space to retain the log data for the required timeframe. | ||
Notes | Use of centrally provisioned, common IT infrastructure and services provided by UITS often fulfills many of these requirements. Check with the service owner for details. | ||
NIST Cross Reference | AU-4, AU-11 |
Definitions
Standard – Standards (like procedures) support policy by further describing specific implementation details (i.e., the "how"). A standard can be thought of as an extension of policy that articulates the rules, mechanisms, technical or procedural requirements, or specifications to be used in carrying out/complying with policy. Standards, along with procedures, promote a consistent approach to following policy. Standards make policies more practically meaningful and effective. Standards are definitional and clarifying in nature, specifying the minimums necessary to meet policy objectives. Because standards directly support policies, compliance with standards is nonoptional and failure to follow standards may result in sanctions imposed by the appropriate university office.
Sanctions
Indiana University will handle reports of misuse and abuse of information and information technology resources in accordance with existing policies and procedures issued by appropriate authorities. Depending on the individual and circumstances involved, this could include the Office of Human Resources, Vice Provost or Vice Chancellor of Faculties (or campus equivalent), Dean of Students (or campus equivalent), Office of the Vice President and General Counsel, and/or appropriate law enforcement agencies. See Policy IT-02 (Misuse and Abuse of Information Technology Resources) for more details.
Failure to comply with Indiana University information technology policies may result in sanctions relating to the individual's use of information technology resources (such as suspension or termination of access, or removal of online material); the individual's employment (up to and including immediate termination of employment in accordance with applicable university policy); the individual's studies within the university (such as student discipline in accordance with applicable university policy); civil or criminal liability; or any combination of these.
Additional Contacts
Subject | Contact | Phone | |
---|---|---|---|
Questions about the standard | University Information Security Office | 812-855-UISO (8476) |
History
Initial draft – February 12, 2022
Revised – April 7, 2023
Effective – July 9, 2024