CHAPTER 10
Auditing and Management Processes
In this chapter, you will learn about
• The value of auditing to enforce accountability
• Using clipping levels to define acceptable thresholds
• Using audit trails to re-create events leading to security incidents
• Types of audit logs used to create audit trails
• Using security audits to verify compliance
• Using baselines for configuration control
• Preventing outages with change management
Understanding Auditing and Accountability
Chapter 1 introduced the AAAs of security: authentication, authorization, and accounting. When used together, they ensure that only authorized entities (such as users and applications) can access systems or data and that a record of such activities exists. ...
Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Third Edition, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.