Chapter 8
Proactive Monitoring
Logs, Logs, and More Logs
There are at least two routes to maintain data’s confidentiality, integrity, and availability. The first is a well-known idea to take care of a problem after it occurs. A problem detected might be in need of an easy fix, or it might have progressed beyond a quick repair. You will not know the consequences until you research further and find the root cause. Root cause analysis has its own methods to find details and follows a systematic route that results in using more time and resources. The second way is to proactively monitor the database for any possible or expected problems. In proactive monitoring, you’re always prepared and “expect” a problem to occur. You also have a solution ready ...
Get Database and Application Security: A Practitioner's Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.