Audit Logging for Storage

webinar

Author(s)/Presenter(s):

Storage Security Technical Work Group

Library Content Type

Technical White Paper

White Paper

Library Release Date

Focus Areas

Data Governance & Security

Abstract

Experts agree that audit log management is a critical element of any organizations’s risk management strategy. Audit log data (or just log data) can provide a complete record of access, activity, and configuration changes for applications, servers, and network devices. It can be used to alert management and administrators to unusual or suspicious network and system behavior. Additionally, log data can provide auditors with information required to validate security policy enforcement and proper segregation of duties. Lastly, IT staff can mine log data during rootcause analysis following a security incident; this is particularly important for the recovery and/or damage cleanup as well as the remediation activities. Considering all of these potential uses, audit log management not only assists in achieving corporate compliance, but also reduces the risk of legal exposure from security breaches and costly network downtime. This whitepaper discusses log management from a storage security perspective and provides specific information as it relates to storage resources and networks.