Our Partners close more business.

Use these powerful resources to win more business, faster, with less effort.  
Call 877-411-2220 x121 for personal support with any opportunity.

RESET SEARCH

Hosting Quote Estimator

GET a FREE Sandbox or Trial Environment NOW

How To Use This Tool:  

To find answers to common RFP and RFI questions, select a tag, or, search for terms like "security", "performance", etc.  You will find common questions and answers grouped together in one record.  Follow the tag links to refine your search.  Supporting downloads and documentation are available, below.

Please login to obtain download access to additional supporting documentation.  Registered users can also contribute to the database.  You can request access by Contacting Us.

© Omegabit LLC, 2023

Enter a Search Phrase or Select a Tag

Contenidos con etiqueta audit records .

Audit and audit records

Q:

Do your audit records contain detailed information such as full text recording of privileged commands or the individual identifies of group account users?

Do you have audit record storage capacity to maintain audit records for a significant amount of time?

Do you have documented audit and accountability policy and procedures?

Do you generate audit records that identify users and point in time when they accessed the system or service, and unauthorized access attempts?

Do you retain a list of auditable events that are adequate to support after-the-fact investigations of security events and audit needs? If yes, does the event list include execution of privileged functions?


A:

This is a configurable environment option.

Adjustable per Client requirements.

Auditing and documentation is extensive and method varies by task/layer of change in infrastructure; relevant changes are documented in customer facing change management logs. Additional automated auditing is available as part of a custom configuration at any/all layers of the infrastructure by combining the appropriate facilities for each layer (Omegabit change management, inside OS runtime, Inside Liferay runtime, etc.). Liferay also offers extensive customizable auditing features and capabilities for in-Liferay event logging Liferay and Omegabit confiturations are capable of supporting most any auditing requirement stipulated. Additional configuration and services fees may apply.

This is a configurable environment option.

This is a configurable environment option. Execution of privileged actions and escalation in the OS are logged. All facets of auditing and logging are configurable.

 



No hay ningún comentario aún. Sea usted el primero.