Episode 95 — Spotlight: Protection of Audit Information (AU-9)

Protection of Audit Information (AU-9) ensures that collected logs and audit data remain complete, accurate, and tamper-resistant. For exam readiness, candidates should recognize that audit data often contains sensitive details about system operations, making it a target for attackers seeking to hide traces of intrusion. AU-9 mandates safeguards to restrict access, maintain integrity, and separate audit functions from those being monitored. The goal is to ensure that logs can be trusted as evidence in investigations and assessments.
Operationally, audit data is stored in secured repositories with role-based access controls and cryptographic protections. Write-once storage and digital signatures prevent unauthorized alteration or deletion. Separation of duties ensures that system administrators cannot modify logs of their own activities. Regular integrity checks and backup routines protect against corruption or loss. Metrics such as successful verification rates, unauthorized access attempts, and recovery test results measure control effectiveness. Common pitfalls include insufficient storage protections, missing encryption, and lack of retention oversight. Mastering AU-9 demonstrates that audit information remains a reliable foundation for accountability and continuous monitoring.
 Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 95 — Spotlight: Protection of Audit Information (AU-9)
Broadcast by