Audit Logging¶
The FISMA Document Upload System maintains comprehensive audit logs of all user activities and system events as required for FISMA High Impact Level compliance.
Overview¶
What is Audit Logging?¶
Audit logging is the automatic recording of all security-relevant events in the system. Every action you take is recorded with:
- Who: Your user account (email address)
- What: The action performed
- When: Precise timestamp (UTC)
- Where: IP address and session information
- How: Success or failure status
- Why: Context and additional details
Purpose¶
Audit logs serve multiple purposes:
✓ Security Monitoring: Detect unauthorized access attempts ✓ Compliance: Meet FISMA High audit requirements (AU-2, AU-3, AU-12) ✓ Forensics: Investigate security incidents ✓ Accountability: Track all user actions ✓ Troubleshooting: Diagnose technical issues
What Gets Logged?¶
Authentication Events¶
Every authentication-related action is logged:
- Login attempts (successful and failed)
- Logout events
- MFA code requests
- MFA code verification (successful and failed)
- Passkey registrations
- Passkey authentications
- Passkey removals
- Password reset requests
- Password changes
- Account lockouts (after failed attempts)
- Session timeouts
- Session extensions
Example log entries:
[2025-11-30 14:32:15 UTC] LOGIN_SUCCESS user=attorney@example.com ip=192.0.2.45 session=abc123
[2025-11-30 14:32:20 UTC] MFA_CODE_SENT user=attorney@example.com
[2025-11-30 14:32:45 UTC] MFA_VERIFY_SUCCESS user=attorney@example.com
[2025-11-30 14:40:10 UTC] PASSKEY_AUTH_SUCCESS user=attorney@example.com device=YubiKey
File Upload Events¶
All document upload activities are logged:
- Upload initiated
- File metadata (name, size, type)
- Case number provided
- Encryption start/complete
- Upload success/failure
- Virus scan results
- Transfer to MOVEit
- Upload reference ID
Example log entries:
[2025-11-30 14:45:00 UTC] UPLOAD_INITIATED user=attorney@example.com case=1-25-cv-12345-RSM file=sealed_motion.pdf size=2.4MB
[2025-11-30 14:45:03 UTC] FILE_ENCRYPTED upload_id=upload-2025-11-30-a1b2c3d4e5f6 algorithm=AES-256-CBC
[2025-11-30 14:45:05 UTC] VIRUS_SCAN_CLEAN upload_id=upload-2025-11-30-a1b2c3d4e5f6
[2025-11-30 14:45:07 UTC] UPLOAD_SUCCESS upload_id=upload-2025-11-30-a1b2c3d4e5f6 user=attorney@example.com
[2025-11-30 14:45:10 UTC] MOVEIT_TRANSFER_SUCCESS upload_id=upload-2025-11-30-a1b2c3d4e5f6
Account Management Events¶
User account changes are tracked:
- Registration requests
- Email verifications
- Account activations
- Profile updates (if applicable)
- Account status changes
Example log entries:
[2025-11-30 10:00:00 UTC] REGISTRATION_REQUEST email=attorney@example.com
[2025-11-30 10:02:30 UTC] EMAIL_VERIFIED email=attorney@example.com token=xyz789
[2025-11-30 10:02:31 UTC] ACCOUNT_ACTIVATED email=attorney@example.com
Security Events¶
Critical security events generate audit entries:
- Failed login attempts (including wrong password, wrong MFA code)
- Account lockouts
- Suspicious activity detection
- Password reset abuse attempts
- Session hijacking attempts
- Invalid token usage
- Expired session access attempts
Example log entries:
[2025-11-30 15:10:05 UTC] LOGIN_FAILED user=attorney@example.com reason=invalid_password attempt=1
[2025-11-30 15:10:20 UTC] LOGIN_FAILED user=attorney@example.com reason=invalid_password attempt=2
[2025-11-30 15:10:35 UTC] LOGIN_FAILED user=attorney@example.com reason=invalid_password attempt=3
[2025-11-30 15:10:35 UTC] ACCOUNT_LOCKED user=attorney@example.com reason=max_failed_attempts
[2025-11-30 15:10:36 UTC] SECURITY_ALERT_SENT user=attorney@example.com type=account_lockout
System Events¶
Background system activities are logged:
- Session cleanup (expired sessions removed)
- Database backups
- Key rotation (encryption keys)
- System maintenance
- Configuration changes
- Service starts/stops
Audit Log Details¶
Information Captured¶
Each audit log entry includes:
| Field | Description | Example |
|---|---|---|
| Timestamp | Exact date/time (UTC) | 2025-11-30 14:32:15 UTC |
| Event Type | Type of action | LOGIN_SUCCESS |
| User | Email address | attorney@example.com |
| IP Address | Source IP (anonymized for privacy) | 192.0.2.45 |
| Session ID | Unique session identifier | abc123def456 |
| Result | Success or failure | SUCCESS |
| Details | Additional context | session_duration=8m34s |
| Reference ID | Related transaction ID | upload-2025-11-30-a1b2c3d4 |
Privacy Protections¶
What is NOT Logged¶
To protect attorney-client privilege and case confidentiality:
❌ Document contents - Never logged or stored in audit trail ❌ Case details - Beyond case number, no case-specific information ❌ Passwords - Never logged (even failed attempts don't log the password) ❌ Document names - Filenames are hashed or redacted ❌ Personal identifiable information - Minimized and protected
Data Protection¶
Audit logs are:
- Stored on secure, encrypted servers
- Access restricted to authorized court personnel only
- Retained according to federal records retention requirements
- Protected with integrity controls (tamper-evident)
- Backed up for disaster recovery
User Rights & Access¶
Can You Access Your Audit Logs?¶
Currently, attorneys do not have direct access to view their audit logs through the system interface.
However, you may request your audit log records by:
- Contacting the Clerk's Office in writing
- Providing specific date range you want records for
- Stating purpose of the request
- Allowing processing time (typically 5-10 business days)
Contact: ecfinfo@waed.uscourts.gov
Your Awareness¶
While you cannot view logs directly, you should be aware that:
✓ All your actions are recorded ✓ Logs are used for security and compliance ✓ Logs may be reviewed during security investigations ✓ Logs are retained for multiple years per federal policy
Compliance Standards¶
FISMA High Requirements¶
The audit logging system meets these NIST 800-53 controls:
- AU-2: Audit Events - Comprehensive event logging
- AU-3: Content of Audit Records - Detailed audit record content
- AU-6: Audit Review, Analysis, and Reporting - Regular log review
- AU-7: Audit Reduction and Report Generation - Log analysis tools
- AU-8: Time Stamps - Synchronized UTC timestamps
- AU-9: Protection of Audit Information - Log integrity and access controls
- AU-11: Audit Record Retention - Long-term retention per federal policy
- AU-12: Audit Generation - System-wide audit capability
Security Monitoring¶
Active Monitoring¶
The Court's IT security team actively monitors audit logs for:
⚠️ Suspicious patterns - Unusual access times or locations ⚠️ Failed authentication attempts - Possible unauthorized access attempts ⚠️ Account abuse - Excessive file uploads or downloads ⚠️ System anomalies - Unexpected errors or failures
Automated Alerts¶
Certain events trigger immediate security alerts:
- Multiple failed login attempts (5+ in 15 minutes)
- Account lockouts
- Login from unusual IP address or location
- Rapid-fire password reset requests
- Large file upload failures (possible attack)
Security staff investigate these alerts within minutes to hours depending on severity.
Incident Response¶
If There's a Security Incident¶
In the event of a security incident involving your account:
- Notification: You'll be contacted by the Clerk's Office
- Investigation: Audit logs will be reviewed
- Actions: May include password reset, account restrictions, etc.
- Resolution: You'll be informed of findings and next steps
Reporting Suspicious Activity¶
If you suspect unauthorized access to your account:
- Change your password immediately
- Contact Clerk's Office: (509) 458-3410 or ecfinfo@waed.uscourts.gov
- Note any unusual activity: Login times, failed attempts, unexpected emails
- Preserve evidence: Don't delete suspicious emails
The audit logs will help investigate and determine if unauthorized access occurred.
Retention & Disposal¶
Retention Period¶
Audit logs are retained for:
- Active logs: Minimum 3 years on primary systems
- Archived logs: Minimum 7 years in secure archive
- Critical incidents: Indefinite retention per legal hold
Retention meets federal court records requirements and FISMA compliance mandates.
Secure Disposal¶
When audit logs reach end-of-retention:
- Logs are securely deleted using approved data destruction methods
- Deletion is logged and verified
- Backups are also securely destroyed
- Chain of custody documented
Related Topics¶
- Session Timeout - Session security and timeout behavior
- Email Notifications - Email notification logging
- MFA Verification - MFA event logging
- Passkey Management - Passkey event logging
Questions About Audit Logging?¶
For questions about audit logging, data retention, or to request your audit records:
Eastern District of Washington - Clerk's Office Phone: (509) 458-3410 Email: ecfinfo@waed.uscourts.gov Hours: Monday-Friday, 8:00 AM - 5:00 PM Pacific Time