This document discusses auditing and accountability in information security. It explains that accountability provides the means to trace activities back to their source through identification, authentication, and access controls. This deters misuse and allows for non-repudiation. The document outlines how auditing, logging, monitoring, and assessments support accountability and security by detecting anomalies and vulnerabilities.