What Checks and Balances Can Be Implemented?
Many access control breaches originate internally. To guard against this risk as well as the risk of external attack, a system of checks and balances should be in place. This way, even a trusted internal user, such as a systems administrator, will know that his or her activities are monitored and any unusual behavior will be noticed.
Track and Monitor Event-Type Audit Logs
Event-type audit logs record specific events on a system. Tracking the events recorded in these audit logs ensures that the events leading up to a security breach, the events that comprise the breach, and any after effects of the breach are understood. No security breach happens ...
Get Access Control and Identity Management, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.