All information resources must implement system-level audit logging. Audit logs include operating system logs, application system logs, database system logs, event logs, error logs, and Web logs. CISO must have access to all security-related audit logs.
Information resources must support audit log capabilities including, but not limited to, independently and selectively monitoring (in real time) the following: