With the click of a mouse or via an automated scheduler, LogRhythm’s out-of-the box NRC RG 5.71 reporting packages ensure you meet your reporting needs.
10 CFR 73.54 (Title 10 of the Code of Federal Regulations section 73.54) requires that “U.S. Nuclear Regulatory Commission (NRC) licensees provide high assurance that digital computer and communication systems and networks are adequately protected against cyber attacks.” Nuclear permitting and licensing are dependent on compliance to 10 CFR 73.54. With regulatory guidance not specifically being addressed in 10 CFR 73.54 the NRC developed and published RG (Regulatory Guide) 5.71 to cover many areas surrounding access control, audit and accountability, incident response, and system and information integrity.
LogRhythm collects all access activity. LogRhythm analysis capabilities and reporting provide easy review of user access for independently ensuring access control settings separate duties.
LogRhythm provides centralized monitoring, analysis, and reporting of audit activity across the entire IT infrastructure. It automates the process of identifying high-risk activity and prioritizes based on asset risk. High-risk activity can be monitored in real-time or alerted on and automated reports provide easy and standard review of inappropriate, unusual, and suspicious activity.
- Audit Failures by User
- Audit Failures by Host
- Suspicious Activity by User
- Suspicious Activity by Host
- Top Suspicious Users
- Top Targeted Hosts
- Top Targeted Applications
LogRhythm can alert on specific intrusion related activity. Users can be notified based on department or role, and an integrated knowledge base provides information and references useful in responding to and resolving intrusions.
Download LogRhythm Whitepapers