From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
Data event auditability
From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review
Data event auditability
- Cloud data security controls depend upon our ability to audit and our ability to audit depends upon our logging and monitoring capabilities. I discuss those in chapter eight of the video course. Let's review the key concepts. (whooshing) Logging is crucial to cloud security efforts. When logging is configured properly, organizations can look at a specific event and achieve three important objectives. First, they can determine who caused the event. This is known as accountability or identity attribution. Second, they can track down all other events related to the investigated event. That's a characteristic known as traceability. And finally, they can provide clear documentation of these actions. That's auditability. Security information and event management, or SIEM systems, have two major functions on an enterprise network. First, they act as a central, secure collection point for log entries. Second, they…
Contents
-
-
-
Cloud data storage1m 43s
-
Cloud data storage Q&A1m 27s
-
Encryption2m 7s
-
Encryption Q&A1m 33s
-
Key management1m 54s
-
Key management Q&A1m 46s
-
Public key infrastructure2m 28s
-
Public key infrastructure Q&A1m 32s
-
Cryptographic applications1m 53s
-
Cryptographic applications Q&A1m 20s
-
Data protection1m 52s
-
Data protection Q&A1m 14s
-
Information management2m 52s
-
Information management Q&A1m 4s
-
Data event auditability2m 59s
-
Data event auditability Q&A1m 1s
-
-