From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Audit mechanisms

Audit mechanisms

- [Narrator] Welcome to this lesson on audit mechanisms. In this lesson, we're first going to talk about collection, and then we'll talk about correlation. And finally, packet capture. Starting with collection, this is going to be the strategic log collection and navigating through data overload. So in many environments, including the cloud, there is a challenge posed by the sheer volume of data generated by logs. And this starts by determining what needs to be logged. It can be tempting to log everything, which in some cases may be useful, but as an organization, you should only log everything if you have effective procedures in place for being able to handle that volume of logs. Not being careful about what we're choosing to log can create an unmanageable influx of data, which can complicate, rather than really aid security efforts by creating too much to go through. Some strategies we can use here are going to be setting thresholds for logging, determining specific minimum criteria…

Contents