Auditing and availability

Now we will look into each security control checklist:

  • Read through logs to monitor for suspicious activity.
  • Configure auditd configuration to perform system accounting.
  • Ensure backup is working, and also check restores.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset