Audit Logging and Monitoring

SLAC’s approach to Audit Logging and Monitoring is based on the collection, management and analysis of the logs of key systems and networks. These logs include detailed information on auditable events, such as failed login attempts, and the flow of network traffic across SLAC internal networks (subnets). SLAC’s Minimum Security Requirements for Computing require that all log data be made available to the Cyber Security Team upon request.

Computing (OCIO, BTS)
Functional Category: 
Computing & IT
View Permission: 
Last Updated: 
Thursday, December 10, 2015