Copilot
Your everyday AI companion
About 13,200,000 results
  1. AU-2: Audit Events - CSF Tools - Identity Digital

  2. AU-2 - STIG Viewer

  3. People also ask
    AU-2a. AU-2b. AU-2c. AU-2d. Determines that the following events are to be audited within the information system: Assignment: organization-defined audited events (the subset of the auditable events defined in AU-2 a.) along with the frequency of (or situation requiring) auditing for each identified event.
    stigviewer.com
    IT Security Procedural Guide: Audit and Accountability (AU), CIO-IT Security 01-08, Revision 7, is hereby approved for distribution. Audit trails maintain a record of system activity both by system and application processes and by user activity of systems and applications.
    Vendor/contractor systems must be able to generate audit records for the auditable events specified in AU-2a with the content in AU-3 for all system components. System Owners, Custodians, ISSOs, and ISSMs must collaborate on which specific events are to be audited by specific components.
  4. AU-2 - NIST 800-53 r5 Control Explorer - GRC Academy

  5. AU-2(3): Reviews And Updates - CSF Tools - Identity Digital

  6. AU-2 AUDIT EVENTS - VMware Docs

  7. AU - Audit and Accountability Control Family - VMware Docs

  8. AU-12 - STIG Viewer

  9. AU: AUDIT & ACCOUNTABILITY Artifacts | wayfinder.digital

  10. Some results have been removed