Implementing a Trusted Information Sharing Environment Implementing a Trusted Information Sharing Environment

Implementing a Trusted Information Sharing Environment

Using Immutable Audit Logs to Increase Security, Trust, and Accountability

Publisher Description

In this report, the Markle Task Force on National Security in the Information Age explores the use of immutable audit logs (IALs) to improve confidence and trust in the shared information environment (ISE) and thereby promote ISE's widespread adoption. The Markle Task Force explains, "The ability to maintain tamper-resistant logs of user activity on the network can increase security, build trust among users, ensure compliance with relevant policies and guidelines, and improve transparency and the ability to perform oversight by appropriate stakeholders outside of the system." In addition to defining IALs and identifying the benefits of this process, this report also offers considerations for the implementation process and recommendations for related policy.

GENRE
Reference
RELEASED
2012
16 April
LANGUAGE
EN
English
LENGTH
23
Pages
PUBLISHER
Markle Foundation
SIZE
192.1
KB

More Books Like This

Creating a Trusted Network for Homeland Security Creating a Trusted Network for Homeland Security
2012
Protecting America's Freedom In the Information Age Protecting America's Freedom In the Information Age
2012
A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis  &  Psychology of Intelligence Analysis A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis  &  Psychology of Intelligence Analysis
2017
2011국가정보화백서 2011국가정보화백서
2011
A Step By Step Guide: How to Perform Risk Based Internal Auditing for Internal Audit Beginners A Step By Step Guide: How to Perform Risk Based Internal Auditing for Internal Audit Beginners
2014
Big Data Big Data
2013

More Books by The Markle Foundation

Creating a Trusted Network for Homeland Security Creating a Trusted Network for Homeland Security
2012
Protecting America's Freedom In the Information Age Protecting America's Freedom In the Information Age
2012

Customers Also Bought

Network Centric Warfare Network Centric Warfare
1999
Conflicts of Interest Conflicts of Interest
2012
Anatomy of a Phish Anatomy of a Phish
2014
The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
2012
Administration: Configuration and Security Administration: Configuration and Security
2013
Security Vs. Convenience Security Vs. Convenience
2012