Skip to main content
Security Controls
Administrative and Technical Cybersecurity Controls
Checklists
Acceptable Use
CHK-AU-007
Login to view status
CHK-AU-007
Ensure all system usage is logged and auditable
Checklists
Acceptable Use
Description
5.5 Accountability and Auditability
Examples
SIEM audit logs