CHAPTER 3Applied Auditing and Audit Vault
In the security life cycle, we think of the phases as protect, detect, respond, and remediate. Most of the security time and attention is focused on the protect phase. However, we cannot always protect everything from everyone or everyone from everything. This leads us naturally to the detect phase. Sitting squarely at the center of detect is auditing.
If you conducted a survey of security professionals, you would probably find that auditing is considered one of the least exciting areas of security. However, security professionals know they must address auditing at some level, but it rarely gets top attention for several reasons. Some don’t know what to audit; some don’t know how to audit; some don’t ...
Get Applied Oracle Security: Developing Secure Database and Middleware Environments now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.