AU-9(3)
      
        
        
      
      
        
  AU-9(3): Cryptographic Protection
      
      
        
        
      
    
  
    
      
  
    
    Implement cryptographic mechanisms to protect the integrity of audit information and audit tools.
  
  
    
    
  Supplemental
Cryptographic mechanisms used for protecting the integrity of audit information include signed hash functions using asymmetric cryptography. This enables the distribution of the public key to verify the hash information while maintaining the confidentiality of the secret key used to generate the hash.
| CIA Levels | |
|---|---|
| Confidentiality | unknown | 
| Integrity | high | 
| Availability | unknown | 
| Overlays | 
|---|
| DAF Baseline, Privacy (high), Privacy (moderate) | 
| CSF Categories | 
|---|
| None |