AU-14: Session Audit

CSF v1.1 References:

PF v1.0 References:

Threats Addressed:


  • Low


  • Moderate


  • High


  • Privacy


Previous Version:

Info icon.

Incorporates the following control from the previous version of the control set: AU-14(2): Capture/Record And Log Content.

Control Statement

  1. Provide and implement the capability for [Assignment: organization-defined users or roles] to [Assignment (one or more): record, view, hear, log] the content of a user session under [Assignment: organization-defined circumstances]; and
  2. Develop, integrate, and use session auditing activities in consultation with legal counsel and in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.

Supplemental Guidance

Session audits can include monitoring keystrokes, tracking websites visited, and recording information and/or file transfers. Session audit capability is implemented in addition to event logging and may involve implementation of specialized session capture technology. Organizations consider how session auditing can reveal information about individuals that may give rise to privacy risk as well as how to mitigate those risks. Because session auditing can impact system and network performance, organizations activate the capability under well-defined situations (e.g., the organization is suspicious of a specific individual). Organizations consult with legal counsel, civil liberties officials, and privacy officials to ensure that any legal, privacy, civil rights, or civil liberties issues, including the use of personally identifiable information, are appropriately addressed.

Control Enhancements

AU-14(3): Remote Viewing and Listening


(Not part of any baseline)

Provide and implement the capability for authorized users to remotely view and hear content related to an established user session in real time.