From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Enable data audit, trace, and accountability

Enable data audit, trace, and accountability

- [Instructor] Welcome to this lesson on enabling data auditing, tracing, and accountability. In this lesson, we'll first talk about some event sources and attribution. Then we'll talk about logging, storage, and analysis of data. And then finally we'll talk about two concepts, which are chain of custody and non-repudiation. So first of all, events are observable occurrences in a system or network. Basically just think of these being as something happened on a system, and we want to send a record of that occurrence to a centralized location. So events can come from a variety of different sources such as users, systems, and data stores. So some examples here maybe are that a user logs into a system or perhaps a system accesses a data store and reads or writes to a database. All of these are examples of events. Some challenges in the cloud environment for collecting events from these different sources could be varying levels of data accessibility. For example, in a SaaS application or…

Contents