AU-14—Session Audit
>Control Description
Provide and implement the capability for ⚙organization-defined users or roles to [Selection (one or more): record; view; hear; log] the content of a user session under ⚙organization-defined circumstances; and
Develop, integrate, and use session auditing activities in consultation with legal counsel and in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
>DoD Impact Level Requirements
No specific parameter values or requirements for this impact level.
>Discussion
Session audits can include monitoring keystrokes, tracking websites visited, and recording information and/or file transfers. Session audit capability is implemented in addition to event logging and may involve implementation of specialized session capture technology. Organizations consider how session auditing can reveal information about individuals that may give rise to privacy risk as well as how to mitigate those risks.
Because session auditing can impact system and network performance, organizations activate the capability under well-defined situations (e.g., the organization is suspicious of a specific individual). Organizations consult with legal counsel, civil liberties officials, and privacy officials to ensure that any legal, privacy, civil rights, or civil liberties issues, including the use of personally identifiable information, are appropriately addressed.
>Related Controls
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of AU-14 (Session Audit)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring AU-14?
- •How frequently is the AU-14 policy reviewed and updated, and what triggers policy changes?
- •What training or awareness programs ensure personnel understand their responsibilities related to AU-14?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce AU-14 requirements.
- •What automated tools, systems, or technologies are deployed to implement AU-14?
- •How is AU-14 integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce AU-14 requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of AU-14?
- •What audit logs, records, reports, or monitoring data validate AU-14 compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of AU-14 effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate AU-14 compliance?
Ask AI
Configure your API key to use AI features.