AU-9 Protection of Audit Information
Last Review: 10/1/22
Statement
West Texas A&M University information system must protect audit information and audit tools from unauthorized access, modification, and deletion.
Applicability
This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.
Implementation
- Access to all centralized audit logs shall be restricted to users with administrative permissions. This includes access to any log collection servers. Administrative permissions are controlled by the security office.
- Wherever possible log servers should issue alerts for any modified or deleted system log, these alert should include at a minimum the Custodian, and ISO.