Skip Top Navigation
  • Who We Are

    • Leadership
    • Financials
    • Government Relations
    • Judicial Officer
    • Legal
    • Our History
    • Postal Facts
  • What We're Doing

    • Strategic Planning
    • Current Initiatives
    • Securing The Mail
    • Sustainability
    • Corporate Social Responsibility
    • Government Services
    • Postal Customer Council
    • Service Performance Results
  • Newsroom

    • National News
    • Local News
    • Testimony & Speeches
    • Broadcast Downloads
    • Events Calendar
    • Photo Gallery
    • Service Alerts
  • Careers

    • Career Opportunities
    • Working at USPS
    • How to Apply
    • Profile Login
  • Doing Business with Us

    • Suppliers
    • Licensing
    • Rights & Permissions
    • Auctions
    • Public Key Infrastructure
The image is the profile of an eagle's head adjoining the words United States Postal Service to form the corporate signature, along with the text About
Link to "2-3 Security Awareness and Training" Link to contents for "2 Security Requirements"      Link to "2-5 Configuration Management"

2-4 Audit and Accountability

Audit and accountability guidelines are as follows:

  1. Create, protect, and retain system audit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate system activity.
  2. Ensure that the actions of individual system users can be uniquely traced.
  3. Review and update logged events.
  4. Alert appropriate personnel in the event of an audit process failure.
  5. Correlate audit review, analysis, and reporting processes for investigation and response to indications of inappropriate, suspicious, or unusual activity.
  6. Provide audit reduction and report generation to support on-demand analysis and reporting.
  7. Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records.
  8. Protect audit information and audit tools from unauthorized access, modification, and deletion.
  9. Limit management of audit functionality to a subset of privileged users.



Link to "2-3 Security Awareness and Training" Link to contents for "2 Security Requirements"      Link to "2-5 Configuration Management"
  • LEGAL

    • Privacy Policy ›
    • Terms of Use ›
    • FOIA ›
    • No FEAR Act EEO Data ›
  • ON ABOUT.USPS.COM

    • Newsroom ›
    • USPS Service Alerts ›
    • Forms & Publications ›
    • Careers ›
    • Site Index ›
  • ON USPS.COM

    • USPS.com Home ›
    • Buy Stamps & Shop ›
    • Print a Label with Postage ›
    • Customer Service ›
    • Delivering Solutions to the Last Mile ›
  • OTHER USPS SITES

    • Business Customer Gateway ›
    • Postal Inspectors ›
    • Inspector General ›
    • Postal Explorer ›
Copyright© 2025 USPS. All Rights Reserved.