How to maintain reasonable investigation capabilities, auditability, and traceability of data

Logging and monitoring the following application events:

  • Management of network connections
  • Addition or removal of users
  • Management of changes to privileges
  • Assignment of users to tokens
  • Addition or removal of tokens
  • Management of system administrative privileges access
  • Actions by users with administrative privileges
  • Use of data encrypting keys
  • Management of key changes
  • Creation and removal of system level objects
  • Import and export of data, including screen based reports
  • Submission of user-generated content, especially file uploads

Featured Post

Biz & Tech Summit Pitch Startup Competition is coming up.

This is a great opportunity to get exposure for your startup and potentially win some prizes.