CISSP · · 3 min read

Accountability, Monitoring, and Session Management: Knowing Who Did What and When

Authentication and authorization are not enough without logging and monitoring. Learn how to design accountability and session controls that support detection, forensics, and compliance.

Title

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Accountability, Monitoring, and Session Management: Knowing Who Did What and When

Hook / Why this matters

Authentication and authorization tell you who can do what. Accountability tells you what they actually did. Without good logging, monitoring, and session management, you cannot detect abuse, investigate incidents, or prove compliance.

Core concept explained simply

Accountability links actions in a system to specific identities in a way that can be verified later.

Identification, authentication, authorization, accountability

The full chain works like this:

  1. Identification: A subject claims an identity, such as entering a username
  2. Authentication: The subject proves that identity
  3. Authorization: The system checks what that identity is allowed to do
  4. Accountability: The system records what the subject actually does

If any link is weak, accountability suffers.

Audit logging

Audit logs record security relevant events such as:

Good logging requires decisions about:

Logs themselves are sensitive and must be protected from tampering.

Session management

A session represents a period of authenticated interaction between a user and a system.

Key controls include:

Poor session management makes token theft or shoulder surfing more damaging.

Monitoring and alerting

Logging by itself is not enough. Monitoring analyzes logs and other signals to detect anomalies and trigger alerts.

Monitoring systems often feed into a Security Information and Event Management (SIEM) platform.

Non repudiation

Non repudiation means that a user cannot credibly deny performing an action.

It relies on:

CISSP lens

For CISSP, accountability and monitoring connect technical controls with legal and compliance requirements.

Important exam angles:

Scenarios may ask which logs are most important to retain, how long to keep them, or which control best improves accountability.

Real world scenario

An insider used legitimate access to slowly exfiltrate customer data over several months. The organization had logs, but they were stored locally on each server, with no central collection and no regular review.

When unusual activity was finally suspected, investigators found:

In response, the organization:

Subsequent incidents were detected more quickly, and investigations had a clearer trail of evidence.

Common mistakes and misconceptions

Actionable checklist

Key takeaways

Optional exam style reflection question

Question: An employee denies submitting a high value financial transaction. The system uses strong authentication, logs all actions with timestamps, and applies a digital signature to each transaction. Can the employee credibly repudiate the action

Answer: No. The combination of strong authentication, detailed logging, and a digital signature provides non repudiation. It creates an evidence chain showing that the transaction was initiated from the employee's account and signed with their private key.

Read next

© 2025 Threat On The Wire. All rights reserved.