Event Logging | AU-2
Description
- Information resources must keep security-related event logs that establish individual accountability for actions that can potentially threaten the confidentiality, integrity, or availability of the information resource.
- Based on periodic risk assessments, Information Resource Custodians, and the Cybersecurity Manager are responsible for ensuring that information systems log a sufficiently complete history of transactions to support an after-the-fact investigation by logging and tracing the activities of individuals through the system.
- The Cybersecurity Manager or their designee is responsible for reviewing and updating the event types selected for logging periodically.
Last updated: 5/12/2026
Contact Hours or Questions?