Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability

Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability

Using Immutable Audit Logs to Increase Security, Trust, and Accountability

Utgivarens beskrivning

In this report, the Markle Task Force on National Security in the Information Age explores the use of immutable audit logs (IALs) to improve confidence and trust in the shared information environment (ISE) and thereby promote ISE's widespread adoption. The Markle Task Force explains, "The ability to maintain tamper-resistant logs of user activity on the network can increase security, build trust among users, ensure compliance with relevant policies and guidelines, and improve transparency and the ability to perform oversight by appropriate stakeholders outside of the system." In addition to defining IALs and identifying the benefits of this process, this report also offers considerations for the implementation process and recommendations for related policy.

GENRE
Uppslagsböcker
UTGIVEN
2012
5 mars
SPRÅK
EN
Engelska
LÄNGD
23
Sidor
UTGIVARE
Markle Foundation
LEVERANTÖRS­UPPGIFTER
Lulu Enterprises, Inc.
STORLEK
131,5
KB
Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
2012
Protecting America's Freedom in the Information Age: A Report of the Markle Foundation Task Force Protecting America's Freedom in the Information Age: A Report of the Markle Foundation Task Force
2012
Conflicts of Interest Conflicts of Interest
2012
The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
2012
Security Vs. Convenience Security Vs. Convenience
2012
The Myth of the Secure OS The Myth of the Secure OS
2012
Beginner's Guide to Information Security Beginner's Guide to Information Security
2016
What Is HTML5? What Is HTML5?
2011