What security events conduct one audit for a business application?

I already check the success of authorization, failure and logout.

I reviewed the audit (logging) of each method call and saved a version of each row and column that has ever been modified, but both of these options significantly increase the complexity of the audit. Auditing a random subset is too random.

Legal specifications (FISMA, C & A) just say that something needs to be checked.

Are there any other non-domain audit strategies that I forget?

+3
source share
2 answers

, , , , -/- ..

, . " " .

- , , ... , , .... , , , , .

, -, , . ( ).

. - , , , " 2938". , , . , , - , "Dave deleted..." - , -

.

+3

, , , . sql, ( , SQL Server). , , , . (dba backup) prod, , , , , . . , dbas , , - , .

, . , . , , . , , , - , .

, , , , .

+2

Source: https://habr.com/ru/post/1709179/


All Articles