Episode 86 — Align IAM Logging With Policies and Regulations Including PCI DSS and GDPR
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
概要
This episode ties identity and access logging to policy and regulatory expectations, showing how to design evidence that satisfies both security outcomes and compliance requirements, which ISSAP frequently tests by mixing audit language with real-world architecture constraints. You’ll learn how to align IAM log content, retention, access controls, and reporting to organizational policies and to common regulatory drivers, focusing on accountability, least privilege enforcement, and proof that access to sensitive systems and data is monitored and reviewed. We’ll cover practical examples such as logging administrative actions on payment systems, tracking access to personal data repositories, documenting access reviews and exceptions, and ensuring logs are protected as sensitive data themselves under privacy rules. Troubleshooting considerations include collecting more personal data than necessary in logs, missing required events because integrations were incomplete, and retention settings that conflict across legal, privacy, and security needs. This is the last episode in the series, and it brings the logging and IAM threads together into a single defensible approach you can apply on the exam and in real architecture reviews. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.