Home > General, Information Security, Security > Store those audit logs seperately

Store those audit logs seperately

This is not some thing new. A hacker would always look into ways to clear his traces either in case of successful or failure attempt.

Hence it’s a strong urge to storing audit logs separate from the machine or database where application data is stored. Not only that, you need to apply same logical and physical controls as to what applied for application database. In fact more better if the security controls applied on the audit machine is more stringent.

Apart from protection and storage,  the audit trail data should be archived periodically and monitored regularly.

As always stated in my posts “Security can’t just be addressed with Technology by itself, you need a strong PROCESS coupled with Technology to address the same more effectively”.

  1. January 25, 2011 at 7:48 PM

    it was such a great document. We are really looking forward to another article.


  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: