1902 Audit and Accountability Policy
Department of Human Services |
Index: |
POL1902 |
|
Revised: |
03/20/2024 |
||
Next Review: |
03/20/2026 |
Subject: DHS Information Security Policies
Policy
This policy establishes the Agency Audit and Accountability Policy, for managing risks from inadequate event logging and transaction monitoring through the establishment of an effective Audit and Accountability program. The audit and accountability program helps DHS implement security best practices with regard to event and transaction logging and the retention of audit evidence.
Authority
-
United States Department of Commerce National Institute for Standards and Technology (NIST)
-
United States Internal Revenue Service
-
United States Department of Health & Human Services
-
Centers for Medicare & Medicaid Services
References
Applicability
The scope of this policy is applicable to all Information Technology (IT) resources owned or operated by DHS. Any information not specifically identified as the property of other parties, that is transmitted or stored on DHS IT resources (including e-mail, messages and files) is the property of DHS. All users (DHS employees, contractors, vendors or others) of IT resources are responsible for adhering to this policy.
Responsibilities
DHS shall adopt the Audit and Accountability principles established in NIST SP 800-53 “Audit and Accountability Control Family guidelines,” as the official policy for this domain. The following subsections outline the Audit and Accountability standards that constitute DHS policy. Each DHS Business System is then bound to this policy and shall develop or adhere to a program plan which demonstrates compliance with the policy related the standards documented. In conjunction with appropriate tools and procedures, audit trails will assist in detecting security violations, performance problems, and flaws in applications.
AU-1 Audit and Accountability Policy
-
Senior management, management, and all organization entities are required to coordinate and implement necessary controls for providing and maintaining effective auditing and accountability controls to IT resources and information systems on the basis of business and security requirements.
-
Periodic reviews of this policy shall be performed and documented at least within every three years, or when there is a significant change.
-
Periodic review of audit and accountability procedures shall be performed at least annually.
AU-2 Auditable Events
-
The agency ensures all information systems are capable, at minimum, of auditing the following event types:
-
Log onto system
-
Log off system
-
Change of password
-
All system administrator commands, while logged on as system administrator
-
Switching accounts or running privileged actions from another account, (e.g., Linux/Unix SU or Windows RUNAS)
-
Creation or modification of super-user groups
-
Subset of security administrator commands, while logged on in the security administrator role
-
Subset of system administrator commands, while logged on in the user role
-
Clearing of the audit log file
-
Startup and shutdown of audit functions
-
Use of identification and authentication mechanisms (e.g., user ID and password)
-
Change of file or user permissions or privileges (e.g., use of suid/guid, chown, su)
-
Remote access outside of the corporate network communication channels (e.g., modems, dedicated VPN) and all dial-in access to the system
-
Changes made to an application or database by a batch file
-
Application-critical record changes
-
Changes to database or application records, where the application has been bypassed to produce the change (via a file or other database utility)
-
All system and data interactions concerning FTI
-
Additional platform-specific events, as defined in SCSEMs located on the Office of Safeguards website
-
-
The security audit function shall be coordinated amongst DHS organizational entities in an effort to enhance mutual support and help tailor the selection of auditable events which helps benefit the agency’s security posture.
-
Agency identified auditable events have been validated and shall require continuous review to ensure the events are adequate to support after-the-fact investigations of security incidents. The list of auditable events is reviewed and updated at least annually or when there is a significant change to the information system.
AU-3 Content of Audit Records
-
Configure information systems to generate audit records containing sufficient information to establish what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals or subjects associated with the event. At a minimum, the following elements shall be identified within each audit record:
-
What type of event occurred
-
When (date and time) the event occurred
-
Where the event occurred
-
The source of the event
-
The outcome (success or failure) of the event
-
The identity of any user/subject associated with the event
-
Audit records are created such that they contain sufficient amounts of detail required to reconstruct events if unauthorized activity or a malfunction occurs or is suspected. At a minimum, audit records shall record for audit events identified by type, location, or subject.
-
AU-4 Audit Storage Capacity
Audit record storage capacity has been established and shall be maintained to reduce the likelihood of exceeding capacity. The agency retains audit records for the required audit retention of seven years to meet agency retention requirements.
AU-5 Response to Audit Processing Failures
-
Designated organizational or service provider officials are alerted in the event of an audit processing failure.
-
System operational status is monitored using operating system or system audit logs. Functions and performance of the system are also verified.
-
Identified personnel are notified when allocated audit record storage volume is reaches maximum audit record storage capacity.
AU-6 Audit Review, Analysis, and Reporting
-
Information system audit records shall be reviewed at least weekly (or more frequently at the discretion of the information system owner) for indications of inappropriate or unusual activity related to potential unauthorized access (e.g. access to FTI). Unauthorized access found via audit records review is immediately reported to supervision and OIT Security.
-
Unauthorized disclosures of FTI are reported in accordance with the agency’s Incident Response Plan, Treasury Inspector General for Tax Administration (TIGTA) requirements, and the IRS Office of Safeguard contact requirements.
-
The agency adjusts the level of audit review, analysis, and reporting within the information asset when there is a change in risk to organizational operations, organizational assets, individuals, other organizations due to credible intelligence.
AU-7 Audit Reduction and Report Generation
-
Agency service providers provide audit reduction and report generation to support on- demand audit reviews, analysis, reporting requirements and after-the-action investigations of security incidents
-
Mechanisms to prevent the altering of data in its original content or time ordering of audit records are employed.
AU-8 Time Stamps
-
Internal system clocks are utilized in order to generate time stamps for audit records to facilitate logging and monitoring.
-
Time stamps for audit records are recorded to ensure that audit records can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
-
The internal information system clocks are compared and synchronized to approved authoritative time sources (e.g. NIST, Naval Observatory).
AU-9 Protection of Audit Information
-
The agency ensures that audit information and audit tools are protected from unauthorized access, modification, and deletion by ensuring appropriate access controls are implemented and maintained.
-
Explicit authorization is required for access to manage audit functionality, and is restricted only to designated security administrator(s) or staff other than system or network administrators.
-
System and network administrators do not have the ability to modify or delete audit log entries.
AU-10 Non-Repudiation
The agency protects against an individual falsely denying having performed a particular action on company information assets by ensuring appropriate non-repudiation mechanisms are implemented.
AU-11 Audit Record Retention
Audit records on agency information systems that DO NOT host, store, and transmits FTI data are maintained for 90 days and archive old records for one year. Audit records for information systems which host, store and transmits FTI data to support after-the- fact investigations of security incidents and to meet regulatory and organizational information retention requirements are maintained for seven years.
AU-12 Audit Generation
DHS shall:
-
Audit record generation capability for the list of auditable events defined in AU-2 for information systems is implemented.
-
Designated organizational personnel select which auditable events are to be audited by specific components of the system.
-
Audit records for the list of audited events defined in AU-2 with the content as defined in AU-3 are generated.
Evaluation
The Office of Information Technology (OIT), upon recommendation of the DHS Chief Information Security Officer (CISO), evaluates this policy annually by:
-
Comparing its content and intent to evolving regulatory compliance standards imposed upon the Agency, such as, IRS 1075, NIST 800-53, and CMS MARS-E.
-
Addressing any deficiencies or gaps discovered during periodic audits conducted by Georgia DOAA or other regulatory bodies, such as, IRS, CMS, SSA, FBI, etc.