8.5. Audit Monitor ( Specialized Cloud Mechanisms Unit 3 chapter 1)

8.5. Audit Monitor
The audit monitor mechanism is used to collect audit tracking data for networks and IT resources in support of (or dictated by) regulatory and contractual obligations.
Figure 8.15 depicts an audit monitor implemented as a monitoring agent that intercepts “login” requests and stores the requestor’s security credentials, as well as both failed and successful login attempts, in a log database for future audit reporting purposes.

Figure 8.15. (1) A cloud service consumer requests access to a cloud service by sending a login request message with security credentials .
(2)The audit monitor intercepts the message
and (3)forwards it to the authentication service .
(4)The authentication service processes the security credentials. A response message is generated for the cloud service consumer, in addition to the results from the login attempt .
(5)The audit monitor intercepts the response message and stores the entire collected login event details in the log database, as per the organization’s audit policy requirements .
(6)Access has been granted, and a response is sent back to the cloud service consumer .

Cloud computing concept Book Link
CLOUDCOMPUTING THEORY PLAYLIST
CLOUD COMPUTING PRACTICAL PLAYLIST
Subscribe the Channel Link
IF any #Query or #Doubt #DM on #Instagram :- #bansode_ajay_2102
#bansode_tech_solution

Comments

Popular posts from this blog

Load Data From Excel To Grid View in Asp.net C#

Code Analysis | IDE0054 In C# Application

10.5. Identity and Access Management (IAM) in Cloud Computing