When a person hears the term “audit”, the first association is related to paper documentation requested, reviewed, and analyzed by the audit department on a regular basis or in case of fraud or abnormal activities. Nowadays, when all businesses are striving to go digital, audits… Read More »Audit Trail – Purpose, Importance and Best Practices
Audit trail Category: Learn more about audit trail, how to protect it, and how to use it as digital evidence in court.
Many organizations understand that the integrity of their audit trail is important only after a security incident takes place and they realize they cannot rely on their audit logs. Having had a lot of experience in this area here at LogSentinel, as an information security… Read More »Webinar: Audit Trail in Large Organisations
It’s been almost two years since GDPR came into force. During this period, many huge companies were under the hackers’ radar and they suffered from losing both reputation and financial assets.
The SentinelTrails add-on, LogSentinel’s blockchain-protected, secure audit trail, is now available on Heroku marketplace, starting at $0/mo. Swiftly deploy SentinelTrails add-on using Heroku, and ensure that all your logs, data and documents are protected. SentinelTrails Features Immutable Evidence The blockchain-based technology does not allow any… Read More »SentinelTrails Is Now Available On Heroku Beta
Logs are ubiquitous in IT – they are semi-structured pieces of information about the behavior of a system and its users. Many standards, regulations and best practices assume and require the existence of logs. Consequently, many systems collect those logs and make use of them for… Read More »Log Collectors Landscape: SIEM, Log Collectors, UEBA, and Audit Trail
It is for a good reason that “integrity” is one of the three main aspects of information security. Lack of data integrity can be a serious issue in many cases, as we have already discussed in our post “3 Reasons Not to Ignore Data Integrity”.… Read More »Does Your SIEM Guarantee Log Integrity? And Does It Make You Compliant?
Most large enterprises are using SAP’s ERP system. And the larger the enterprise is, the more compliance requirements it has to cover. This means, in part, that it’s vital to have the SAP Security Audit Log enabled, properly configured and properly protected. What is SAP Security Audit… Read More »How to Protect Your SAP Audit Logs
Non-repudiation is a key property in many contexts – it means that the author of some message cannot deny that they produced the message. This property has a particular meaning in the context of audit trail and logs in general. As pointed out by Eric Knapp:… Read More »Why You Need Non-Repudiation of Logs and How Blockchain Helps
HIPAA, the US healthcare regulation, has some rigid requirements about data security and privacy. That aligns perfectly with LogSentinel’s mission so we decided to help our customers in their HIPAA compliance efforts by providing a clear mapping between HIPAA requirements and SentinelTrails functionality. # Requirement… Read More »How To Cover HIPAA Security Rule Regarding Audit Trail
There are a lot of products that allow collecting data, aggregating it and displaying it for security or monitoring purposes. That includes SIEMs (Security information and event management systems), UEBAs (User and entity behavior analytics), log collectors and catch-all multi-purpose data platforms (like Splunk). And when you… Read More »Track Events You Have Not Tracked Before