Relevant security log information should include but is not limited to:
• The event type
• The event time
• The event location
• The event source
• The event outcome
• The identities of any individuals or systems associated with the event
Generate audit records containing relevant security information.