Log Integrity in the Cloud

By Sean Martin  |  Posted 01-31-2011 Print Email

WEBINAR: On-demand webcast

Next-Generation Applications Require the Power and Performance of Next-Generation Workstations REGISTER >

Changing the logs is the easiest way for a cloud provider to cover its tracks should an accident or misuse of power occur. It is also the easiest way for malicious software and users to do the same. To properly protect against this risk, the system logs and applications logs must be signed in a way such that there is undeniable, mathematical proof that they have not changed since the system or application created them.



 

Submit a Comment

Loading Comments...
Manage your Newsletters: Login Register