15 Ensuring telemetry integrity
This chapter covers
- Understanding why you should defend telemetry integrity
- Defending telemetry against outside attackers
- Defending telemetry against malicious insiders
- Making telemetry tamper-evident
This chapter is about security. Your telemetry systems provide details about how your production systems are operating, which includes a whole host of details that an attacker looking to hide their tracks would rather not be present. Outside attackers seek to prevent telemetry that shows their presence from entering the system. Inside attackers (evil insiders) remove or alter telemetry to hide their activities. Your telemetry systems need to be resilient to both kinds of attacks, which requires multiple defense ...
Get Software Telemetry now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.