Greetings,
I am consulting with a client and their external account firm has challenged them to log and monitor heightened access accounts (administrator and a select number of critical generic accounts) (for this discussion just UNIX)high risk activity.
First we must identify "high risk" functions. Then we must identify a managable method of tracking thes activities for the identified heightened access accounts.
Any background experiences, thoughts, feedback, comments (keep'm clean .
Thank you in advance.
Britt
I am consulting with a client and their external account firm has challenged them to log and monitor heightened access accounts (administrator and a select number of critical generic accounts) (for this discussion just UNIX)high risk activity.
First we must identify "high risk" functions. Then we must identify a managable method of tracking thes activities for the identified heightened access accounts.
Any background experiences, thoughts, feedback, comments (keep'm clean .
Thank you in advance.
Britt