Ask the Expert

Audit trails for secure data storage

What can VARs do to implement audit trails in the companies they are working with? How will this help data security?

    Requires Free Membership to View

The benefit of audit trails is tied to the authentication of who is authorized to use a particular command or function of a storage system as well as access secure data storage in general. The audit logs for some environments can be used for diagnostics as well for intrusion forensic analysis or other follow-up or audits.

Storage system vendors are beginning to implement new security techniques like tamper proof logs and audit trails as standard features of secure data storage. However, you don't have to stop there. Look beyond traditional data storage security like encryption and include authentication, authorization, secure audit trails, secure erase, digital shredding and secure asset disposal for additional security.

This was first published in May 2007

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: