The actions of all parties having authorized access to the system, and the complete chain of events and outcomes resulting from these actions, should be recorded so that this history can be reviewed.
The audit records should provide an appropriate level of detail, in accordance with business needs.
The actual configuration of the system should also be capable of being audited so as to compare it with a target configuration that represents the implementation of the security policy that governs the system.
|
|
| namespace | SABSA |
| stereotype | RiskAttribute |
| softMetric | Independent audit and review against Security Architecture Capability Maturity Model. |
| hardMetric | Documented target configuration exists under change control with a capability to check current configuration against this target. |