Log Integrity in the Cloud
WEBINAR: On-demand webcast
Next-Generation Applications Require the Power and Performance of Next-Generation Workstations REGISTER >
Changing the logs is the easiest way for a cloud provider to cover its tracks should an accident or misuse of power occur. It is also the easiest way for malicious software and users to do the same. To properly protect against this risk, the system logs and applications logs must be signed in a way such that there is undeniable, mathematical proof that they have not changed since the system or application created them.