How Log Management Can Enhance Infrastructure Security in Disaster Recovery Situations When an enterprise network goes down – because of natural disaster, accidental system failure, or security breach – the first priority is identifying the impact and restoring the infrastructure to its pre-disaster state. However, how “clean” is the pre-disaster infrastructure? Have servers been tainted with malware that can replicate to multiple data systems on the disaster recovery site and allow security breaches? Were data confidentiality, integrity, and availability compromised in any way, either before or during the incident? And would you have the data required to troubleshoot these issues during an outage? The bad news is that such security breaches are often not found for weeks or months after they occur. However, log management best practices can provide those answers and help you determine if you’re working with a compromised infrastructure following disaster recovery (DR). Moreover, compliance with PCI, Sarbanes-Oxley, HIPAA,
Monday, 13 January 2014 23:00
Log Management: When Disaster Strikes You’ll Be Glad You DidWritten by MISHA GOVSHTEYN
Leave a comment
Make sure you enter the (*) required information where indicated. HTML code is not allowed.