Identity requirements
Ready to simplify access management?
We'd love to help you get to more maintainable access controls
Auditing and logging
Identity-related audit requirements ensure organizations record access activities and detect unauthorized use of access. This includes maintaining logs of events, implementing monitoring and alerting for unusual activity, and regularly reporting on access usage and conformance to processes for managing access.
Types and content of logs
Authentication logs
Authentication logs record user authentication events, that is, the verification of a user's identity, for both successful as well as attempted logins. These logs typically include:
Access usage logs
Access usage logs record user activities within a system after authentication, that is, what a user actually accesses within a system. These logs typically include:
Access change logs
Access change logs document modifications to permissions or access rights. These are audit logs (who did what, where and when) to change access in an environment. These logs typically include:
Privileged activity logs
Privileged activity logs record actions performed as part of a privileged or elevated access session. These logs typically include:
Typical required log elements
Log management
Identity-related audit logs should be stored in case they need to be referenced as part of an investigation. These logs should be handled in line with how an organization handles its other security logs.
Common compliance requirements
Real-time monitoring
Continuously monitoring identity-related logs helps detect suspicious activities in an environment in real time. Logs from multiple systems are often centralized in a Security Information and Event Management (SIEM) system for monitoring.
Common compliance requirements
Alerting
When unusual actions are detected through monitoring, alerting is used to notify administrators to review the issue and take action. Typical alerts include:
Identity-related security alerts should be quickly triaged and actioned. As an organization matures, it will tune alerts to reduce false positives so that there are fewer but higher signal alerts over time.
Common compliance requirements
Compliance Reporting
Organizations use logging and monitoring to demonstrate compliance with identity controls. This includes auditing access controls to verify they meet regulatory requirements, and confirming the organization follows its established policies. This might be done as part of an audit for a specific compliance framework.