AU-6 - Audit Review, Analysis, and Reporting
Control requirements
The organization:
- AU-6 (a)
- Reviews and analyzes information system audit records [IBM Assignment: at least weekly] for indications of [Assignment: organization-defined inappropriate or unusual activity]; and
- AU-6 (b)
- Reports findings to [Assignment: organization-defined personnel or roles].
Implementation guidance
See the resources that follow to learn more about how to implement this control.
NIST supplemental guidance
Audit review, analysis, and reporting covers information security-related auditing performed by organizations including, for example, auditing that results from monitoring of account usage, remote access, wireless connectivity, mobile device connection, configuration settings, system component inventory, use of maintenance tools and nonlocal maintenance, physical access, temperature and humidity, equipment delivery and removal, communications at the information system boundaries, use of mobile code, and use of VoIP. Findings can be reported to organizational entities that include, for example, incident response team, help desk, information security group/department. If organizations are prohibited from reviewing and analyzing audit information or unable to conduct such activities (e.g., in certain national security applications or systems), the review/analysis may be carried out by other organizations granted such authority.