6M.1.DEMO: Registration: Display audit trail for access to restricted data¶
Establish an approach to provide audit trails for access to restricted data.
What they achieved¶
This slide deck shows a very high level workflow of how events are logged as part of the Gen3 tools and then passed to the ELK stack for auditing and analysis, while the video demo containts a very rich and full feature set for auditing and logging in their stack.
Why is this valuable?¶
With some of the databases available for study being restricted to particular users, auditing and logging functions must be available to provide security reports to make sure that access is only available to authorized users as part of the KC6 guidelines.