8.5. Audit Monitor ( Specialized Cloud Mechanisms Unit 3 chapter 1)
8.5. Audit Monitor
The audit monitor mechanism is used to collect audit tracking data for networks and IT resources in support of (or dictated by) regulatory and contractual obligations.
Figure 8.15 depicts an audit monitor implemented as a monitoring agent that intercepts “login” requests and stores the requestor’s security credentials, as well as both failed and successful login attempts, in a log database for future audit reporting purposes.
Figure 8.15. (1) A cloud service consumer requests access to a cloud service by sending a login request message with security credentials .
(2)The audit monitor intercepts the message
and (3)forwards it to the authentication service .
(4)The authentication service processes the security credentials. A response message is generated for the cloud service consumer, in addition to the results from the login attempt .
(5)The audit monitor intercepts the response message and stores the entire collected login event details in the log database, as per the organization’s audit policy requirements .
(6)Access has been granted, and a response is sent back to the cloud service consumer .
Cloud computing concept Book Link
CLOUDCOMPUTING THEORY PLAYLIST
CLOUD COMPUTING PRACTICAL PLAYLIST
Subscribe the Channel Link
IF any #Query or #Doubt #DM on #Instagram :- #bansode_ajay_2102
#bansode_tech_solution
The audit monitor mechanism is used to collect audit tracking data for networks and IT resources in support of (or dictated by) regulatory and contractual obligations.
Figure 8.15 depicts an audit monitor implemented as a monitoring agent that intercepts “login” requests and stores the requestor’s security credentials, as well as both failed and successful login attempts, in a log database for future audit reporting purposes.
Figure 8.15. (1) A cloud service consumer requests access to a cloud service by sending a login request message with security credentials .
(2)The audit monitor intercepts the message
and (3)forwards it to the authentication service .
(4)The authentication service processes the security credentials. A response message is generated for the cloud service consumer, in addition to the results from the login attempt .
(5)The audit monitor intercepts the response message and stores the entire collected login event details in the log database, as per the organization’s audit policy requirements .
(6)Access has been granted, and a response is sent back to the cloud service consumer .
Cloud computing concept Book Link
CLOUDCOMPUTING THEORY PLAYLIST
CLOUD COMPUTING PRACTICAL PLAYLIST
Subscribe the Channel Link
IF any #Query or #Doubt #DM on #Instagram :- #bansode_ajay_2102
#bansode_tech_solution
Comments
Post a Comment