The benefit of audit trails is tied to the authentication of who is authorized to use a particular command or function of a storage system as well as access secure data storage in general. The audit logs for some environments can be used for diagnostics as well for intrusion forensic analysis or other follow-up or audits.
Storage system vendors are beginning to implement new security techniques like tamper proof logs and audit trails as standard features of secure data storage. However, you don't have to stop there. Look beyond traditional data storage security like encryption and include authentication, authorization, secure audit trails, secure erase, digital shredding and secure asset disposal for additional security.
Dig deeper on Data Backup and Data Protection
Related Q&A from Retired Expert - Greg Schulz
Certain aspects of virtualization storage and green storage technologies are getting more attention then they currently warrent.continue reading
Disaster recovery planning should be required by all companies, no matter what their budgets. The following Q&A is excerpted from Greg Schulz's ...continue reading
When offering disaster recovery services, no size business is off limits. The following Q&A is excerpted from Greg Schulz's podcast on disaster ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.