How Much Log Security Do You Need?
For reference see "Top 11 Reasons to Secure Logs"
http://chuvakin.blogspot.com/2007/10/top-11-reasons-to-secure-and-protect.html
Which of the following log security measures do you consider essential and/or actually implement in your organization?
83% (20) | Authenticated access to log server | |
---|---|---|
62% (15) | Logging all access to logs | |
33% (8) | Cryptographic hashing of stored logs (e.g. SHA) | |
29% (7) | Cryptographic signing of stored log data | |
25% (6) | Encryption of stored log data | |
16% (4) | Logs stored on read-only media (physical e.g. DVD) | |
25% (6) | Logs stored on read-only media (software e.g. protected disk backup) | |
50% (12) | Reliable / acknowledged network transfer of log data | |
45% (11) | Encryption of log data in transit | |
0% (0) | Logs printed and stored in a safe; deleted from IT systems :-) | |
12% (3) | Other security measures |
24 voters have answered this question.
This poll was created on 2008-08-05 22:02:44
by Anton_Chuvakin