Auditing (Privilege, Usage, and Escalation)

If you go through the trouble and effort of restricting access to certain resources and datasets, you will likely want to make sure only authorized individuals are able to gain access to those resources. Chances are, you’ll also want to know who accessed what resources, when they accessed the resources, and what they did. When dealing with privilege management, auditing includes any actions or processes used to verify the assigned privileges and rights of a user, as well as any capabilities used to create and maintain a record showing who accessed a particular system and what actions they performed. Records showing which users accessed a computer system and what actions they performed are called audit ...

Get CompTIA Security+ All-in-One Exam Guide (Exam SY0-301), 3rd Edition, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.