8. Auditing for Security
Information in this Chapter
In this chapter we look into using Auditing to ensure that security best practices are being followed so that the database instance is secure.
Setting security policies is a great start, but you need to ensure that the system remains secure. This is where auditing comes into play. Auditing by itself isn’t good enough; someone needs to review the auditing information that has been collected in order to ensure that the system has remained as secure as expected. This includes monitoring the logins into the database, ...