Under active development Content is continuously updated and improved

AU-9(4)Protection of Audit Information | Access by Subset of Privileged Users

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Authorize access to management of audit logging functionality to only organization-defined subset of privileged users or roles.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Individuals or roles with privileged access to a system and who are also the subject of an audit by that system may affect the reliability of the audit information by inhibiting audit activities or modifying audit records. Requiring privileged access to be further defined between audit-related privileges and other privileges limits the number of users or roles with audit-related privileges.

>Programmatic Queries

Beta

Related Services

IAM
KMS
S3

CLI Commands

Create IAM policy restricting audit log access to specific privileged users
aws iam create-policy --policy-name AuditLogAccessPolicy --policy-document file://audit-access-policy.json
Enable S3 encryption for audit logs using customer-managed KMS keys
aws s3api put-bucket-encryption --bucket audit-logs --server-side-encryption-configuration '{"Rules":[{"ApplyServerSideEncryptionByDefault":{"SSEAlgorithm":"aws:kms","KMSMasterKeyID":"arn:aws:kms:us-east-1:123456789012:key/12345678-1234-1234-1234-123456789012"}}]}'
Create CloudTrail with specific data events for audit access logging
aws cloudtrail put-event-selectors --trail-name audit-trail --event-selectors 'ReadWriteType=All,IncludeManagementEvents=false,DataResources=[{Type=AWS::S3::Object,Values=[arn:aws:s3:::audit-logs/*]}]'
Enable MFA delete on S3 audit bucket for additional access restriction
aws s3api put-bucket-versioning --bucket audit-logs --versioning-configuration Status=Enabled,MFADelete=Enabled

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of AU-9(4) (Access By Subset Of Privileged Users)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring AU-9(4)?
  • How frequently is the AU-9(4) policy reviewed and updated, and what triggers policy changes?
  • What training or awareness programs ensure personnel understand their responsibilities related to AU-9(4)?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce AU-9(4) requirements.
  • What automated tools, systems, or technologies are deployed to implement AU-9(4)?
  • How is AU-9(4) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce AU-9(4) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of AU-9(4)?
  • What audit logs, records, reports, or monitoring data validate AU-9(4) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of AU-9(4) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate AU-9(4) compliance?

Ask AI

Configure your API key to use AI features.