While auditing every possible action and object access is great from a security perspective, reality says that's not going to happen. Carol discusses how to lessen the impact of auditing on your system.
By Carol Woodbury
Don't get me wrong. Speaking from a security professional's perspective, the more you audit, the better. Information in the audit journal is invaluable when performing forensics and extremely helpful to the system and security administrators to debug daily issues. But here's where the ideal must meet the practical. The fact of the matter is, the storage capacity on most systems doesn't allow you to turn on every auditing feature and log every object access. So what do you do when you find that your system is filling up with audit journal receivers? This article discusses some options.