We discuss the use of auditing and accountability in this chapter. We talk about the need to hold others accountable when we provide access to the resources on which our businesses are based on to personal information of a sensitive nature. We also go over the processes we carry out in order to ensure that our environment is compliant with the laws, regulations, and policies that bind it, referred to as auditing. In addition, we address the tools we use to support auditing, accountability, and monitoring activities, such as logging and monitoring.
Accountability; admissibility; assessments; auditing; deterrence; intrusion detection; intrusion prevention; logging; monitoring; nonrepudiation