10.10.2014 Views

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

eviewed weekly and every system and every log entry<br />

type should be reviewed biweekly.<br />

7.1.3.b Log Prioritization Scheme<br />

• Events that affect systems and/or information <strong>of</strong> greater<br />

criticality and/or sensitivity should receive a higher<br />

prioritization.<br />

• Events that occur with greater frequency should receive a<br />

higher prioritization.<br />

• Events that can be correlated across multiple systems should<br />

receive a higher prioritization.<br />

• Other factors can be included in the prioritization process:<br />

o Time <strong>of</strong> day <strong>of</strong> the event.<br />

o Day <strong>of</strong> the week and/or month <strong>of</strong> the event.<br />

o Source <strong>of</strong> the event.<br />

o Newness <strong>of</strong> the event.<br />

7.1.3.c Log Response<br />

• Where systems are determined to be out <strong>of</strong> synchronization<br />

with established standards, system documentation should be<br />

checked to determine if the variance is documented and<br />

approved. If not, the system owner is to be contacted and the<br />

system should be restored to established standards.<br />

• Where security attacks are determined to have occurred the<br />

event should be considered a Security Incident and Incident<br />

Response processes should be initiated.<br />

• Where policy violations are determined to have occurred,<br />

depending on the nature <strong>of</strong> the violations, various actions may<br />

be taken:<br />

o <strong>Policy</strong> violation sanctions may be taken.<br />

o Incident Response processes may be triggered.<br />

7.2. Maintain Records<br />

Agencies should capture documentation appropriate to all systems audit processes:<br />

• Document and retain copies <strong>of</strong> the configuration <strong>of</strong> logging capabilities for<br />

each system.<br />

• Document and retain copies <strong>of</strong> the results <strong>of</strong> all tests <strong>of</strong> system logging<br />

capabilities.<br />

• Maintain copies <strong>of</strong> all reports generated as a result <strong>of</strong> log monitoring and<br />

analysis.<br />

23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!