In most compliance frameworks and best practices guides there are references to
appropriately auditing events within an information technology
infrastructure. This
places a great deal of importance on appropriately managing event
data. However, in recent SANS Advisory Board and SecurityFocus
discussions, it is clear that log
management is often times an elusive ideal which is near impossible
for most companies to implement for a myriad of reasons. Chief among
them is the fact that not many organizations truly understand the
methods with which to dissect and utilize logging sources. This paper
defines a standard methodology which can be used to develop use cases
that can be used to help organizations quantify the scope and need for
log management technologies.

To read full paper from SANS, visit below URL:
http://www.sans.org/reading_room/whitepapers/auditing/effective-case-modeling-security-information-event-management_33319

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to