From the course: Protecting Data for Analysis and Machine Learning

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Audit trails

Audit trails

- Like it or not, things will happen to your data that you would never expect to happen. Corruption, loss, modification, or you can't read it anymore because somehow it just turned into the Wingdings font. But the good thing about data is that everything and anything that happens to it can be tracked. Yeah, it's kind of like "Big Brother," but I promise it's for good. Let's explore how together. It's a good idea to implement logging and monitoring to capture activities related to your data. These logs are referred to as audit trails and are typically set up by the security team. While most companies are legally obligated to have an audit trail, they can also be extremely helpful to protect against internal and external threats. These logs should be detailed enough to answer questions about your data, including who, what, when, and from where data is involved. In order to answer these questions easily, there are certain activities that should be captured. These are any and all…

Contents