The benefit of audit trails is tied to the authentication of who is authorized to use a particular command or function of a storage system as well as access secure data storage in general. The audit logs for some environments can be used for diagnostics as well for intrusion forensic analysis or other follow-up or audits.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Storage system vendors are beginning to implement new security techniques like tamper proof logs and audit trails as standard features of secure data storage. However, you don't have to stop there. Look beyond traditional data storage security like encryption and include authentication, authorization, secure audit trails, secure erase, digital shredding and secure asset disposal for additional security.
Dig Deeper on Data Backup and Data Protection
Related Q&A from Greg Schulz
Service provider outages should be a warning to customers that keeping data safe in the cloud is a shared responsibility.continue reading
When cloud durability is added to the mix, cloud providers are able to tout a high number of nines of availability.continue reading
Cloud storage can be less expensive from a cost-per-gigabyte perspective, but it's important not to lose sight of other benefits as a value ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.