Which action is NOT included in the requirements for audit logs according to NISPOM?

Prepare for the DoD Certified Counter‑Insider Threat Professional – Fundamentals (CCITP‑F) Exam. Use flashcards and multiple choice questions with detailed explanations to excel on your exam!

The requirements for audit logs, as outlined in the National Industrial Security Program Operating Manual (NISPOM), emphasize capturing events that are critical for security monitoring and incident response. The correct response highlights that changes in user roles are not specifically mandated for inclusion in audit logs.

The rationale is that while tracking user roles is important for understanding access permissions and possible security implications, NISPOM primarily focuses on monitoring direct activity that can impact security, such as login attempts, access denials, and user account management actions, which are captured in the other options. Successful and unsuccessful logins provide essential insights into how users are accessing the system, while blocking user IDs and denying access after excessive login attempts are key actions that indicate potential security threats or misuse. Thus, the emphasis is primarily on these active security events rather than on changes in user roles, which may fall more into administrative documentation rather than real-time security monitoring.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy