ADP/Network Audits

A Trusted Computer System is a system that employs formal hardware and software integrity measures sufficient to allow its use for processing sensitive or classified information. These systems are given a designation based on how many measures are employed. While some large lab systems meet full high level trusting capabilities, most personal computers at NRL are designated class C2 functionality. This designation means the ADP must employ discretionary access control, memory clearing before reuse, individual accountability, and audit trails before approval to process classified data. These controls do not need to be automated into the operating system.

Obviously, users performing classified processing on a stand alone system in a dedicated mode can easily incorporate physical safeguards such as removable drives, user approval, audit trail log books, or other controls based on their needs. Networked systems, however, have a number of audit controls, some of which are automatically incorporated into their network software.

Fully trusted systems that process classified information at NRL require formal audit procedures. These procedures are normally built into trusted systems prior to their certification. According to the National Computer Security Center's Trusted Computer System Evaluation Criteria (TCSEC) the audit mechanism should be capable of monitoring every time a system is accessed, who accessed it, and which file was accessed. Auditing on trusted systems primarily concerns audit trails and controls for computer access.

The TCSEC gives the following as the Accountability Control Objective:

"Systems that are used to process or handle classified or other sensitive information must assure individual accountability whenever either a mandatory or discretionary security policy is invoked. Furthermore, to assure accountability the capability must exist for an authorized and competent agent to access and evaluate accountability information by a secure means, within a reasonable amount of time and without undue difficulty."

Formal Audit Requirements for Trusted Systems

The minimum trust requirements for all DoD computer systems at NRL is level C2 functionality. C2 is considered the benchmark for audit trails. The following sections, derived from NCSC-TG-001, describe the audit requirements for class C2.

6.1.1 Auditable Events: The following events shall be subject to audit at the C2 class:

1. Use of identification and authentication mechanisms
2. Introduction of objects into a user's address space
3. Deletion of objects from a user's address space
4. Actions taken by computer operators and system administrators and/or system security administrators
5. All security-relevant events (as defined in Section 5 of this guideline)
6. Production of printed output

6.1.2 Auditable Information

The following information shall be recorded on the audit trail at the C2 class:

1. Date and time of the event
2. The unique identifier on whose behalf the subject generating the event was operating
3. Type of event
4. Success or failure of the event
5. Origin of the request (e.g., terminal ID) for identification/authentication events
6. Name of object introduced, accessed, or deleted from a user's address space
7. Description of modifications made by the system administrator to the user/system security databases