Information Technology Audit and Logging – Regulation and Policy Hub (2024)

Policy Number: 12-005

Category: Information Technology

Responsible Executive: Vice President and Chief Information Officer

Responsible Office: Information Technology

To provide accurate and comprehensive audit logs in order to detect and react to inappropriate access to, or use of, information systems or data.

This policy applies to all Information Systems that store, process or transmit University Data.

Information System means an individual or collection of computing and networking equipment and software used to perform a discrete business function. Examples include the eLearning System, Student Information System, the EPIC electronic medical records system, a lab system and associated PC or the set of desktop computers used to perform general duties in a department.

University of Florida Datameans data in any format collected, developed, maintained or managed by or on behalf of the University, or within the scope of University activities. The terms ‘data’ and ‘information’ are used interchangeably in the context of the information security program.

4.1. Access to Information Systems and data, as well as significant system events, must be logged by the Information System.

4.2. Information System audit logs must be protected from unauthorized access or modification.

4.3. Information System audit logs must be retained for an appropriate period of time, based on the Document Retention Schedule and business requirements. Audit logs that have exceeded this retention period should be destroyed according to UF document destruction policy.

University Regulation 1.0102: Policies on Information Technology and Security
University of Florida Records Retention Schedules

NIST 800-53 revision 5: AU-2, AU-3, AU-4, AU-5, AU-6, AU-7, AU-8, AU-10, AU-11, AU-12

Additional Resources

Standard Number: SEC-TS-006.01
Standard Family: Information Security
Standard Category: Technical Security
Effective: 3-7-2017, Amended 7-18-2024 (substantive)

Purpose:

In order for Information Technology activity and audit logs to be useful, they must record sufficient information to serve the operational needs, preserve accountability, and detect malicious activity. This standard defines these events and content.

Standard:

  1. All information systems will produce audit records for at least the following events:
    1. System startup and shutdown
    2. User logon and logoff
    3. Privilege escalation
    4. Account creations, changes or deletions
    5. Password changes
  2. Information systems should produce audit records for the following event types, depending on system capabilities:
    1. Starting and stopping of processes and services
    2. Installation and removal of software
    3. System alerts and error messages
    4. System administration activities
    5. Access to and modification of Restricted Data
  3. Log records will include at least the following elements:
    1. Identifier of the system that generated the event
    2. Timestamp of the event
    3. The action or type of event and any relevant data
    4. Success or failure of the action
    5. The user associated with the event
    6. Remote address, if the event occurs over a network connection

History

History: New 3-7-2017,Amended 7-18-2024 (administrative)

Information Technology Audit and Logging – Regulation and Policy Hub (2024)
Top Articles
ExamFX Insurance License Course Review | StateRequirement
The 3 Best Cryptos to Buy in July 2024
No Hard Feelings Showtimes Near Metropolitan Fiesta 5 Theatre
Best Pizza Novato
CLI Book 3: Cisco Secure Firewall ASA VPN CLI Configuration Guide, 9.22 - General VPN Parameters [Cisco Secure Firewall ASA]
Craigslist Motorcycles Jacksonville Florida
Horoscopes and Astrology by Yasmin Boland - Yahoo Lifestyle
Remnant Graveyard Elf
Ktbs Payroll Login
Revitalising marine ecosystems: D-Shape’s innovative 3D-printed reef restoration solution - StartmeupHK
How to watch free movies online
‘Accused: Guilty Or Innocent?’: A&E Delivering Up-Close Look At Lives Of Those Accused Of Brutal Crimes
Colts seventh rotation of thin secondary raises concerns on roster evaluation
Summoner Class Calamity Guide
Belle Delphine Boobs
Labor Gigs On Craigslist
Dr Manish Patel Mooresville Nc
Truth Of God Schedule 2023
Air Force Chief Results
623-250-6295
Wausau Marketplace
Knock At The Cabin Showtimes Near Alamo Drafthouse Raleigh
Shadbase Get Out Of Jail
Globle Answer March 1 2023
Best Boston Pizza Places
14 Top-Rated Attractions & Things to Do in Medford, OR
Cardaras Funeral Homes
Ryujinx Firmware 15
Otis Inmate Locator
Perry Inhofe Mansion
James Ingram | Biography, Songs, Hits, & Cause of Death
Sports Clips Flowood Ms
Flixtor Nu Not Working
Ixlggusd
Wow Quest Encroaching Heat
Robot or human?
Blue Beetle Movie Tickets and Showtimes Near Me | Regal
Culvers Lyons Flavor Of The Day
Anya Banerjee Feet
Cal Poly 2027 College Confidential
Blackstone Launchpad Ucf
Gary Lezak Annual Salary
2023 Fantasy Football Draft Guide: Rankings, cheat sheets and analysis
Does Target Have Slime Lickers
Is Ameriprise A Pyramid Scheme
Walmart 24 Hrs Pharmacy
Conan Exiles Colored Crystal
Gander Mountain Mastercard Login
Doelpuntenteller Robert Mühren eindigt op 38: "Afsluiten in stijl toch?"
Erica Mena Net Worth Forbes
Urban Airship Acquires Accengage, Extending Its Worldwide Leadership With Unmatched Presence Across Europe
Latest Posts
Article information

Author: Wyatt Volkman LLD

Last Updated:

Views: 5901

Rating: 4.6 / 5 (46 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Wyatt Volkman LLD

Birthday: 1992-02-16

Address: Suite 851 78549 Lubowitz Well, Wardside, TX 98080-8615

Phone: +67618977178100

Job: Manufacturing Director

Hobby: Running, Mountaineering, Inline skating, Writing, Baton twirling, Computer programming, Stone skipping

Introduction: My name is Wyatt Volkman LLD, I am a handsome, rich, comfortable, lively, zealous, graceful, gifted person who loves writing and wants to share my knowledge and understanding with you.