AU-9 - Protection of Audit Information

a. Protect audit information and audit logging tools from unauthorized access, modification, and deletion; and b. Alert [Assignment: organization-defined personnel or roles] upon detection of unauthorized access, modification, or deletion of audit information.


ID: AU-9
Enhancements:  1 | 2 | 3 | 4 | 5 | 6 | 7

Space Segment Guidance

Protecting audit records spans append/retention on-board, trustworthy transfer over constrained links, and safeguarded storage on the ground. Consider append-only or write-once semantics, hash chaining or checkpoints to detect tampering, integrity-protected transport, and segregation of audit repositories from general mission data. Telemetry that reports buffer health, verification outcomes, and any dropped events helps operators manage risk during outages.