Auditing (Privilege, Usage, and Escalation)

If you go through the trouble and effort of restricting access to certain resources and datasets, you will likely want to make sure only authorized individuals are able to gain access to those resources. Chances are, you’ll also want to know who accessed what resources, when they accessed the resources, and what they did. When dealing with privilege management, auditing includes any actions or processes used to verify the assigned privileges and rights of a user, as well as any capabilities used to create and maintain a record showing who accessed a particular system and what actions they performed. Records showing which users accessed a computer system and what actions they performed are called audit ...

Get CompTIA Security+ All-in-One Exam Guide (Exam SY0-301), 3rd Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.