A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage.
A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage.
If the element is present, it must have either a @value, an @id, or extensions
Identifier for a family of the event. For example, a menu item, program, rule, policy, function code, application name or URL. It identifies the performed function.
Identifier for the category of event.
Indicator for type of action performed during the event that generated the audit.
The period during which the activity occurred.
The time when the event was recorded.
Indicates whether the event succeeded or failed.
A free text description of the outcome of the event.
The purposeOfUse (reason) that was used during the event being recorded.
An actor taking an active role in the event or activity that is logged.
The system that is reporting the event.
Specific instances of data or objects that have been accessed.
A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage.
Specification of the participation type the user plays when performing the event.
The security role that the user was acting under, that come from local codes defined by the access control security system (e.g. RBAC, ABAC) used in the local context.
Reference to who this agent is that was involved in the event.
Alternative agent Identifier. For a human, this should be a user identifier text string from authentication system. This identifier would be one known to a common authentication system (e.g. single sign-on), if available.
Human-meaningful name for the agent.
Indicator that the user is or is not the requestor, or initiator, for the event being audited.
Where the event occurred.
The policy or plan that authorized the activity being recorded. Typically, a single activity may have multiple applicable policies, such as patient consent, guarantor funding, etc. The policy would also indicate the security token used.
Type of media involved. Used when the event is about exporting/importing onto media.
Logical network location for application activity, if the activity has a network location.
The reason (purpose of use), specific to this agent, that was used during the event being recorded.
A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage.
An identifier for the network access point of the user device for the audit event.
An identifier for the type of network access point that originated the audit event.
A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage.
Logical source location within the healthcare enterprise network. For example, a hospital or other provider location within a multi-entity provider group.
Identifier of the source where the event was detected.
Code specifying the type of source where event originated.
A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage.
Identifies a specific instance of the entity. The reference should be version specific.
The type of the object that was involved in this audit event.
Code representing the role the entity played in the event being audited.
Identifier for the data life-cycle stage for the entity.
Security labels for the identified entity.
A name of the entity in the audit event.
Text that describes the entity in more detail.
The query parameters for a query-type entities.
Tagged value pairs for conveying additional information about the entity.
A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage.
The type of extra detail provided in the value.
The value of the extra detail.
Success
Minor failure
Serious failure
Major failure
Indicates whether the event succeeded or failed.
If the element is present, it must have either a @value, an @id, or extensions
Create
Read/View/Print
Update
Delete
Execute
Indicator for type of action performed during the event that generated the event.
If the element is present, it must have either a @value, an @id, or extensions
Machine Name
IP Address
Telephone Number
Email address
URI
The type of network access point of this agent in the audit event.
If the element is present, it must have either a @value, an @id, or extensions