E-Book: Log Management for Compliance

Cover Image

Log management has become an increasingly important part of managing information technology across the enterprise. Every significant device and application generates logs, which makes them the most accurate record of who uses key systems, what they do, and when they do it. Logs also record system actions, making them invaluable for troubleshooting. But for IT managers, the challenge is aggregating, collating, and distributing information from many logs to create meaningful analysis and reporting. Log management software has become highly interesting to more senior managers in IT in recent years because it is a powerful tool for at least two initiatives that are high on the agendas of CIOs and other senior level IT managers: improving information security and meeting regulatory compliance mandates.

 

This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well.

 

Chapter 1 - Choosing log management tools for compliance:
Log management tools were originally designed for troubleshooting and then were adopted for security forensics. Now IT organizations are realizing that they can be a vital part of their compliance infrastructure. This chapter will look at the purchase and evaluation criteria for log management tools for compliance use: what reports, device support, and audit capabilities you need to pass your compliance audit.

 

Chapter 2 - Integrating log management into your compliance operations:
This chapter will focus on policies and processes for effective log management for regulatory compliance and, oh yes, security. Requirement 10 of PCI, for instance, calls for the monitoring and testing of networks and specifies that an organization must review logs for all system components at least daily. Log aggregation/log management tools help meet this requirement. The chapter will explain how to build a review process, outline who is accountable and create proper documentation.

 

Sponsored By: Alert Logic, ArcSight, eIQnetworks, LogLogic, LogRhythm, Prism Microsystems

Vendor:
TechTarget Security
Posted:
Feb 8, 2021
Published:
Apr 20, 2009
Format:
PDF
Type:
eBook
Already a Bitpipe member? Log in here

Download this eBook!