Auditing and Management Processes

In this chapter, you will learn about

•  The value of auditing to enforce accountability

•  Using clipping levels to define acceptable thresholds

•  Using audit trails to re-create events leading to security incidents

•  Types of audit logs used to create audit trails

•  Using security audits to verify compliance

•  Using baselines for configuration control

•  Preventing outages with change management

Understanding Auditing and Accountability

Chapter 1 introduced the AAAs of security: authentication, authorization, and accounting. When used together, they ensure that only authorized entities (such as users and applications) can access systems or data and that a record of such activities exists. ...

Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Third Edition, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.