Actually, this statement was amended in a later Industrial Security
Letter...
The comments from the ISL have been incorporated into our NISPOM docs
and include the following:
8.602. Audit Capability
(c) Successful and unsuccessful accesses to security-relevant
objects and directories, including creation, open, close,
modification, and deletion.
55. Question: Paragraph 8-602a(1)(c) can generate upwards to 100
audit entries for each successful access to security-relevant
objects and/or directories. From a security standpoint, is this
information of enough importance to generate voluminous amounts of
auditing data?
Answer: No. Only unsuccessful accesses need to be audited.
Now I can easily imagine that Sarbanes-Oxley or HIPPA may require
auditing successful accesses to SROs, but the NISPOM no longer requires
it...
-Randy Zagar
linux-audit-request(a)redhat.com wrote:
Date: Fri, 26 Jan 2007 15:14:10 -0500
From: "Wieprecht, Karen M." <Karen.Wieprecht(a)jhuapl.edu>
Subject: RE: close(2) not being audited?
To: "Steve Grubb" <sgrubb(a)redhat.com>, <linux-audit(a)redhat.com>
Cc: "Todd, Charles" <CTODD(a)ball.com>
Message-ID:
<FC11D747323EB24493CDC753367EEB92019FA4D3(a)aplesnation.dom1.jhuapl.edu>
Content-Type: text/plain; charset="us-ascii"
Actually, the exact wording says:
"Successful and unsuccessful accesses to security-relevant objects and
directories"
It does not specify exactly how that should be collected, but the
NISPOM does request that the audit record include who tried to access
it, what they tried to access, the time and date of the access attempt,
what command they were trying to run (rm, chmod, etc.), and if they
were successful or not. What happens behind the scenes after the
operating system takes over the request may not be of as much interest
unless collecting that info helps to provide the above details to the
audit record.
-Karen Wieprecht
--
Randy Zagar Sr. Unix Systems Administrator
E-mail: zagar(a)arlut.utexas.edu Applied Research Laboratories
Phone: 512 835-3131 Univ. of Texas at Austin