Chapter 4

Auditing and Accountability

We discuss the use of auditing and accountability in this chapter. We talk about the need to hold others accountable when we provide access to the resources on which our businesses are based on to personal information of a sensitive nature. We also go over the processes we carry out in order to ensure that our environment is compliant with the laws, regulations, and policies that bind it, referred to as auditing. In addition, we address the tools we use to support auditing, accountability, and monitoring activities, such as logging and monitoring.

Keywords

Accountability; admissibility; assessments; auditing; deterrence; intrusion detection; intrusion prevention; logging; monitoring; nonrepudiation

Get The Basics of Information Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.