Requires Free Membership to View
Proper audit and logging requirements are defined by the data itself, but I would focus less on the audit requirements and more on the investigative requirements. If the data is compromised, the next step will be to analyze the situation forensically, draw some conclusions and hopefully prosecute the perpetrators.
If the data coming out of syslog is sufficient to investigate an incident -- and it's stored in a way that will stand up in court -- then I have a hard time believing it wouldn't satisfy an auditor.
More information:
- Prepare for a network security audit with these helpful tips.
- Learn how to use ISO 17799 and SAS 70 to achieve compliance best practices.
This was first published in July 2008
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation