Protective Monitoring Controls
Log data allows organizations to manage the extreme challenges of meeting major GPG implementation specifications. TIBCO LogLogic’s compliance reports and alerts satisfy the following protective monitoring controls:
- Precise Time Stamps: ensures that the accounting and auditing logs record accurate time stamps.
- Recording the Business Traffic crossing a Boundary: identifies the authorized and non-authorized business traffic across the network boundary by defining a set of alerts and reports.
- Recording the suspicious activity on the boundary: identifies the suspicious traffic on the network boundary by defining a set of alerts and reports.
- Recording on Internal Workstation, server or device status: identifies the changes in configuration or status of the internal workstations, servers and network devices by defining a set of alerts and reports.
- Recording the suspicious internal network activity: Identifies the suspicious internal network activity by defining a set of alerts and reports.
- Recording activities on network connections: Identifies temporary connections to the network, such as VPN or wireless connection.
- Recording user activity on the network: identifies the suspicious user activity or enable the forensic analysis of the user activity within the network by defining a set of alerts and reports.
- Recording on data backup process: ensures that the data backup and recovery process is defined and followed, so that the integrity and availability of the network resource is ensured.
- Alerts and reports on critical events: defines set of real-time alerts and reports that identifies the events classified as 'critical' by the organization.
- Reporting the status of auditing system: defines a set of alerts and reports to ensure the integrity of the auditing system.
- Generating management reports: ensures the production of clean and statistical management reports.
- Providing a legal framework: ensures that the protective monitoring activities are performed within the legal framework.
Copyright © Cloud Software Group, Inc. All rights reserved.