SYNOPSIS
In The Essentials Series: PCI Compliance, compliance expert Rebecca Herold discusses and demonstrates how meeting the PCI DSS requirements for logging also benefits businesses by putting into place log management practices that:
- Help to identify when authorized users may be doing things they should not be doing.
- Help to reveal when unauthorized users from outside the network perimeter have breached the network.
- Reveal vulnerabilities within applications that could have led to information security incidents and privacy breaches if they were not discovered.
CHAPTER PREVIEWS
Article 1: Using PCI DSS Compliant Log Management To Identify Insider Access Abuse
In the first article, Rebecca Herold discusses and demonstrates how meeting the PCI DSS requirements for logging also benefits businesses by putting into place logs that help to identify when authorized users may be doing things they should not be doing.
Article 2: Using PCI DSS Compliant Log Management To Identify Attacks From The Outside
In the second article, Rebecca Herold discusses and demonstrates how meeting the PCI DSS requirements for logging also benefits businesses by putting into place logs that help to reveal when unauthorized users have breached the network.
Article 3: Addressing Application Vulnerabilities with PCI Log Management Compliance
In the last article, Rebecca Herold discusses and demonstrates how meeting the PCI DSS requirements for logging benefits businesses by putting into place logs that reveal vulnerabilities within applications that could have led to information security incidents and privacy breaches if they were not discovered.