Log Integrity in the Cloud

By Sean Martin  |  Posted 01-31-2011 Print Email


Modernizing Authentication — What It Takes to Transform Secure Access

Changing the logs is the easiest way for a cloud provider to cover its tracks should an accident or misuse of power occur. It is also the easiest way for malicious software and users to do the same. To properly protect against this risk, the system logs and applications logs must be signed in a way such that there is undeniable, mathematical proof that they have not changed since the system or application created them.


Submit a Comment

Loading Comments...
Manage your Newsletters: Login Register