AU-6(8)—Audit Record Review, Analysis, and Reporting | Full Text Analysis of Privileged Commands
IL6
>Control Description
Perform a full text analysis of logged privileged commands in a physically distinct component or subsystem of the system, or other system that is dedicated to that analysis.
>DoD Impact Level Requirements
No specific parameter values or requirements for this impact level.
>Discussion
Full text analysis of privileged commands requires a distinct environment for the analysis of audit record information related to privileged users without compromising such information on the system where the users have elevated privileges, including the capability to execute privileged commands. Full text analysis refers to analysis that considers the full text of privileged commands (i.e., commands and parameters) as opposed to analysis that considers only the name of the command. Full text analysis includes the use of pattern matching and heuristics.
>Related Controls
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of AU-6(8) (Full Text Analysis Of Privileged Commands)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring AU-6(8)?
- •How frequently is the AU-6(8) policy reviewed and updated, and what triggers policy changes?
- •What training or awareness programs ensure personnel understand their responsibilities related to AU-6(8)?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce AU-6(8) requirements.
- •What automated tools, systems, or technologies are deployed to implement AU-6(8)?
- •How is AU-6(8) integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce AU-6(8) requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of AU-6(8)?
- •What audit logs, records, reports, or monitoring data validate AU-6(8) compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of AU-6(8) effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate AU-6(8) compliance?
Ask AI
Configure your API key to use AI features.