Hello. Sign In
Standards Store
Look Inside

CSA ISO/IEC 10164-8

95th Edition, January 1, 1995

Base Document Only

View complete document

Information Technology - Open Systems Interconnection - Systems Management: Security Audit Trail Function

Includes all amendments and changes through Reaffirmation Notice , 2014


Detail Summary

Active, Most Current

EN
Additional Comments:
INCLUDES CORRIGENDUM 1,2 AND 3
Format
Details
Price (USD)
Secure PDF
Single User
$232.00
Print
In Stock
$252.00
Add to Cart

Product Details:

  • Revision: 95th Edition, January 1, 1995
  • Published Date: January 2014
  • Status: Active, Most Current
  • Document Language: English
  • Published By: CSA Group (CSA)
  • Page Count: 57
  • ANSI Approved: No
  • DoD Adopted: No

Description / Abstract:

This Recommendation I International Standard defines the security audit trail function. The security audit trail function is a systems management function which may be used by an application process in a centralized or decentralized management environment to exchange information and commands for the purpose of systems management, as defined by CCITT Rec. X.700 I ISO 7498-4. This Recommendation I International Standard is positioned in the application layer of CCITT Rec. X.200 I ISO 7498 and is defmed according to the model provided by ISO/IEC 9545. The role of systems management functions is described by CCITT Rec. X.70l I ISO/IEC 10040.

This Recommendation I International Standard

- establishes user requirements for the service definition needed to support the security audit trail reporting function;

- defmes the service provided by the security audit trail reporting function;

- specifies the protocol that is necessary in order to provide the service;

- defines the relationship between the service and management notifications;

- defines relationships with other systems management functions;

- specifies conformance requirements.

This Recommendation I International Standard does not define

- a security audit, nor how to perform one. A security audit may be used to assist in assessing the effectiveness of a security policy. The security policy identifies the categories of security-related events that require auditing, and the location of the security audit trail log in which they are to be recorded;

- the nature of any implementation intended to provide the security audit trail function;

- the occasions where the use of the security audit trail function is appropriate;

- the services necessary for the establishment, normal and abnormal release of a management association;

- any other notifications defmed by other Recommendations I International Standards which may be of interest to a security administrator.
CSA B51