As we have seen in the 1st part of this article, in order to solve the overarching problem of easy compliance, we had to solve many different problems main of which were:
- Capturing of what-was-executed and of other auditing events of interest
- Fault tolerant auditing
- Centralized storage of audited data and integrity checks
- Centralized reporting
- Prevention from tampering of audited data, or exposure when prevention is not possible (e.g. data tampered by trusted user accounts, hacked or otherwise)
In this 2nd part of this article, we will go deeper into solutions that we applied to each of these problems
May 21, 2013