Audit logs are that thing that everyone has a good grasp about in theory, but is hard to define in practice. We have previously covered what is an audit log in IT context and now we’ll focus on why it’s important for security. Why Are… Read More »The Importance of Audit Logs for Security
Audit trail Category: Learn more about audit trail, how to protect it, and how to use it as digital evidence in court.
Logs in the IT context are a piece of evidence, automatically generated and time-stamped when a certain event happens. All information systems produce some kinds of logs. For the security and compliance teams, the most common usage of logs is detecting anomalous activities, validating a… Read More »Log Analytics for Business Process Management
VPN in Time of Pandemic: Best Practices In the times of the COVID-19 crisis, many employees are working from home. The general best practice is to allow them to connect to the corporate network through VPN. That is important for the security of the organization… Read More »VPN Logs: Best Practices of Monitoring and Detecting Anomalies
When a person hears the term “audit”, the first association is related to paper documentation requested, reviewed, and analyzed by the audit department on a regular basis or in case of fraud or abnormal activities. Nowadays, when all businesses are striving to go digital, audits… Read More »Audit Trail – Purpose, Importance and Best Practices
Many organizations understand that the integrity of their audit trail is important only after a security incident takes place and they realize they cannot rely on their audit logs. Having had a lot of experience in this area here at LogSentinel, as an information security… Read More »Webinar: Audit Trail in Large Organisations
Most large enterprises are using SAP’s ERP system. And the larger the enterprise is, the more compliance requirements it has to cover. This means, in part, that it’s vital to have the SAP Security Audit Log enabled, properly configured, and properly protected. What is SAP Security… Read More »How to Protect Your SAP Audit Logs
Non-repudiation is a key property in many contexts – it means that the author of some message cannot deny that they produced the message. This property has a particular meaning in the context of audit trail and logs in general. As pointed out by Eric Knapp:… Read More »Why You Need Non-Repudiation of Logs and How Blockchain Helps
There are a lot of products that allow collecting data, aggregating it, and displaying it for security or monitoring purposes. That includes SIEMs (Security information and event management systems), UEBAs (User and entity behavior analytics), log collectors, and catch-all multi-purpose data platforms (like Splunk). And… Read More »Track Events You Have Not Tracked Before
Protect On-Premise Challenges for Protecting Audit Trail Many large organizations prefer to have their audit trail stored within their own infrastructure. Due to their structure and policies they are reluctant to use cloud services. Using a cloud service has the additional benefit of responsibility segregation… Read More »Protecting On-Premise Audit Trail
An audit trail (or audit log) is something both intuitive and misleading at the same time. There are many definitions of an audit trail, and all of them give you an idea of what it is about: A system that traces the detailed transactions relating… Read More »What is an Audit Trail in IT Context?
A recent EU report on the cybersecurity of elections has warned member states of potential threats for the upcoming European elections. The US midterms are just a week away and concerns about the integrity of the election process are mounting. Even though very few countries vote online,… Read More »Election Security and the Importance of Audit Trail