The benefit of audit trails is tied to the authentication of who is authorized to use a particular command or function of a storage system as well as access secure data storage in general. The audit logs for some environments can be used for diagnostics as well for intrusion forensic analysis or other follow-up or audits.
Storage system vendors are beginning to implement new security techniques like tamper proof logs and audit trails as standard features of secure data storage. However, you don't have to stop there. Look beyond traditional data storage security like encryption and include authentication, authorization, secure audit trails, secure erase, digital shredding and secure asset disposal for additional security.
Dig deeper on Data Backup and Data Protection
Related Q&A from Retired Expert - Greg Schulz
Certain aspects of virtualization storage and green storage technologies are getting more attention then they currently warrent.continue reading
Disaster recovery plans you provide to customers must take into account the availability of hot sites. The following Q&A is excerpted from Greg ...continue reading
Disaster recovery services must include regular disaster recovery plan testing, depending on customers' threat risks and change management needs. The...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.