Policy information: IT-12 Audit and Accountability (AU) Standard
Status: Effective July 9, 2024
Responsible University Office: University Information Policy Office
Responsible University Administrator: Office of the Vice President for Information Technology and Chief Information Officer
Policy Contact: University Information Security Office uiso@iu.edu
Scope
This standard supports Policy IT-12 (Security of Information Technology Resources) and applies to all Indiana University information technology resources, regardless of whether those resources are managed by the university or provisioned from third parties on behalf of the university, and to all users of those resources regardless of affiliation.
Objectives
The key objectives of this standard are to ensure that:
- Information system audit records are created, protected, and retained to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity; and
- The actions of individual information system users can be uniquely traced to those users.
Most information technology has the capability to generate logs such as authentication logs, access logs, system logs, application logs, or service logs. Although different terms may be used for the logs generated by different parts of the technology stack, the concept remains the same. These logs are files that record observable occurrences, events, transactions, or activities that occur on an IT resource and are used for a variety of purposes including troubleshooting, system optimization, detecting unauthorized access or usage, incident investigations, or to meet compliance requirements.