Skip to main content

Enterprise Multiplatform Auditing

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 10 June 2008

  1. .PDF (8.7 MB)

 Order hardcopy
Share this page:   

ISBN-10: 0738485047
ISBN-13: 9780738485041
IBM Form #: SG24-7472-00


Authors: Paola Bari, David Edwards, Thomas Hackett, Jack Jones, Klaus Heinrich Kiwi, Zhu Min, Hanne Wesselsen and Eran Yona

menu icon

Abstract

In today's global world clients needs to show compliance to different laws like Sarbanes Oxley, HIPPA, the European Union's 8th directive, privacy laws, and so on, in an enterprise (horizontal) environment. The environments become more and more complex with the rapid growth of e-business, and they often span several geographies. Most IT organizations are still very much vertical, often with different organizations within each country, with little cooperation between them. Lack of skills on cross-platform skills are also a major issue.

Integration and automation at the infrastructure layer is key to enabling e-business. With the growing number of security databases, proving compliance across the enterprise is very complex.

This is also true for auditors, as they need a very deep knowledge of IT and a variety of solutions and IT Infrastructures to be able to do a reliable audit.

This IBM Redbooks publication documents the results of our efforts and tests to show how you can perform audit trail and report in an enterprise. Our configuration, even though a not very complex one, shows results of using internal (intranet) and external (internet) configurations. We have been testing with standard users and privilege users, using tools that are available in today's market.

Table of Contents

Chapter 1. Strategy overview and security roles

Part 1. Tools

Chapter 2. Enterprise-wide auditing tools

Chapter 3. e-business model auditing tools

Chapter 4. z/OS

Chapter 5. UNIX/Linux auditing tools

Chapter 6. DB2 auditing tools

Part 2. Scenarios

Chapter 7. Introduction to scenarios

Chapter 8. e-business scenarios

Chapter 9. Privileged access

Appendix A. Linux Audit record description

Appendix B. SSL/SSH configuration guides

Appendix C. Additional material

 

Others who read this also read