Using Logs for Security and Compliance: Part 1
Logs have quite a bit of application potential. Check out all about log collection for compliance and security use!
Join the DZone community and get the full member experience.Join For Free
For organizations that need to remain compliant with specific regulatory standards, requirements can too often be confusing and complex. In our latest white paper Using Logs to Address Compliance Standards, we aim to shed light on the role of logs across three popular compliances: HIPAA, PCI DSS, and Sarbanes Oxley.
While each compliance varies in specificity, log management plays a central role in all three. The below excerpt from Using Logs to Address Compliance Standards explores the different types of events an organization should be actively looking for within their logs based on each of the three compliance standards.
Log Collection for Compliance
What type of log events should be collected
Remember that when it comes to logging, compliance standards vary in specificity. Here’s a recap of logging recommendations from section 1:
| || || |
Want to download the 24-page white paper for free? Click here to download.
Published at DZone with permission of Matt Kiernan, DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.