Audit Collection Requirements
- The ISSO must determine what auditable events will be collected based on mode of operation and levels of trust to meet the requirements defined in the information systems security policy. (Source: Panel of Experts, July 1994).