AU-5—Response to Audit Logging Process Failures
>Control Description
Alert ⚙organization-defined personnel or roles within ⚙organization-defined time period in the event of an audit logging process failure; and
Take the following additional actions: ⚙organization-defined additional actions.
>FedRAMP Baseline Requirements
Parameter Values
>Discussion
Audit logging process failures include software and hardware errors, failures in audit log capturing mechanisms, and reaching or exceeding audit log storage capacity. Organization-defined actions include overwriting oldest audit records, shutting down the system, and stopping the generation of audit records. Organizations may choose to define additional actions for audit logging process failures based on the type of failure, the location of the failure, the severity of the failure, or a combination of such factors.
When the audit logging process failure is related to storage, the response is carried out for the audit log storage repository (i.e., the distinct system component where the audit logs are stored), the system on which the audit logs reside, the total audit log storage capacity of the organization (i.e., all audit log storage repositories combined), or all three. Organizations may decide to take no additional actions after alerting designated roles or personnel.
>Cross-Framework Mappings
>Programmatic Queries
Related Services
CLI Commands
aws cloudtrail get-trail-status --name TRAIL_NAME --query '{IsLogging:IsLogging,LatestDeliveryError:LatestDeliveryError}'aws cloudwatch describe-alarms --alarm-name-prefix 'CloudTrail'aws cloudtrail get-trail-status --name TRAIL_NAME --query 'LatestDeliveryError'aws sns list-subscriptions-by-topic --topic-arn ARN>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of AU-5 (Response To Audit Logging Process Failures)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring AU-5?
- •How frequently is the AU-5 policy reviewed and updated, and what triggers policy changes?
- •What training or awareness programs ensure personnel understand their responsibilities related to AU-5?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce AU-5 requirements.
- •What automated tools, systems, or technologies are deployed to implement AU-5?
- •How is AU-5 integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce AU-5 requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of AU-5?
- •What audit logs, records, reports, or monitoring data validate AU-5 compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of AU-5 effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate AU-5 compliance?
Ask AI
Configure your API key to use AI features.