Chapter 14. An Introduction to Systems Auditing

Solutions in this chapter:

▪ Automating the audit process
▪ Maintaining a secure enterprise
▪ Progressive construction of a comprehensive audit program
Summary

Introduction

In this chapter we look at the processes needed to audit a system. A system can be a host or even multiple hosts. Even when focused on a single application it is a rare case where the auditor can ignore the network.
It should be noted that network security is an aide to security in that it catches issues aimed at hosts where it is not possible to watch and secure all hosts adequately. This is not to say that network security is more important than host security, rather that they are essential each in there own manner.
Ambiguities are ...

Get The IT Regulatory and Standards Compliance Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.