Log Integrity in the Cloud

Changing the logs is the easiest way for a cloud provider to cover its tracks should an accident or misuse of power occur. It is also the easiest way for malicious software and users to do the same. To properly protect against this risk, the system logs and applications logs must be signed in a way such that there is undeniable, mathematical proof that they have not changed since the system or application created them.

This article was originally published on 01-31-2011
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.