Manish DipankarforGirmantech Blogblog.girmantech.com·Oct 4, 2024Building an Audit Log in PostgreSQLIn any application, tracking changes in the database is often crucial for accountability and transparency. Whether it's for debugging, security, or compliance, knowing what changes were made, by whom, and when can be essential. In this blog, we will ...Discuss·117 readsgirmantech
Shweta Prasadaudit-trails.hashnode.dev·Oct 3, 2024Audit TrailsWhat is an Audit Trail? An Audit Trail (also called Audit Log) helps companies or organizations to keep a detailed, chronological record of their transactions, user activity, or other financial data for tracking purposes. Maintaining a comprehensive ...Discussaudit logs
Bisola Adedijibeesola.hashnode.dev·Oct 1, 2024How to Get Audit Logs from Linux into WazuhLinux machines collect audit logs via the Linux Audit system. The system listens to events based on pre-configured rules to keep track of what is occurring within the operating system. When a Linux agent is added to Wazuh, audit logs are not automati...Discuss·35 readsaudit logs
Juan Manuel AlbarracínforCobra SecOpscobrasecops.com·Sep 3, 2024How to Easily Send Logs to Splunk Cloud: A Step-by-Step GuideOverview of Log Management and Monitoring Log management and monitoring are essential parts of modern IT infrastructure and cybersecurity. They involve collecting, storing, analyzing, and monitoring log data from various systems, applications, and de...Discuss·56 readsSplunk
Vanessa VillaforPangea Blogpangea.cloud·Aug 22, 2024Mastering HIPAA Audit Log Requirements: A Comprehensive Guide for Developers Building Enterprise Healthcare Systems"Your data may have been exposed". The reason you hear this statement is to meet compliance with the Health Insurance Portability and Accountability Act (HIPAA). This law is a critical aspect of protecting sensitive patient information and identifia...Discuss·48 readsHIPAA
Pranav ShikarpurforPangea Blogpangea.cloud·Aug 21, 2024Understanding Audit Logs: What It Is & How To Build OneAudit logs are a critical component of enterprise systems, providing a detailed record of activities within an information system. They serve as the backbone for security monitoring, compliance, and operational analysis, making them indispensable for...Discuss·110 readsaudit logs
Pranav ShikarpurforPangea Blogpangea.cloud·Jun 7, 2024Add Audit Log Streaming to Auth0 authentication in < 2 minsIn a world where hackers are trying to brute force user accounts (23andMe breach 2023), it is vital for developers to maintain a long-lasting and tamper-proof audit log of all authentication events to keep their apps secure. While many companies use ...Discuss·672 readsAuth0
Pranav ShikarpurforPangea Blogpangea.cloud·Feb 14, 2024Integrate an Audit Trail for NextAuth.js in a few lines of codeIn the world where hackers are trying to brute force user accounts (23andMe breach 2023) and session tokens are being stolen (OKTA breach 2023) to impersonate authenticated users and run critical user actions, it is highly important for developers to...Discuss·900 readsSecurity
Pranav ShikarpurforPangea Blogpangea.cloud·Sep 27, 2022Audit Log Field Guide — Time Travel and Humblebrags✍ This article was written by author Ian Forrest In a previous post, I wrote about audit logs and the compliance frameworks which rely on them. What I didn’t cover is what you need to include in your audit logs to make them useful. After many years...Discuss·764 readsaudit logs
Pranav ShikarpurforPangea Blogpangea.cloud·Jun 21, 2022Marvelous Merkle Trees✍ This article was written by author Ian Forrest In my previous blog post, I wrote about how one might go about building a Tamperproof Logging Implementation. A good-sized chunk of that post was about how one could use Merkle Trees to verify the in...Discuss·1.1K readsmerkle tree