Getting Started
Cybersecurity Fundamentals
Vulnerability and Threat Information
Regulations and Standards
CMMC
CMMC Home
CMMC Training
By Level
By Domain
Additional Resources
CCRA
About CyberAssist
Contact Us
DIB SCC
Search
Select Page
Proofpoint – The Importance of Enterprise Scale for User Activity Monitoring
logz.io – Using Audit Logs for Security and Compliance
Microsoft – Basic Security Audit Policy Settings
CSO – Why you need Centralized logging and event log management
Environmental Protection Agency – Audit and Accountability Procedure
log.io – The Complete Guide to the ELK Stack
Open Web Application Security Project (OWASP) – Logging Cheat Sheet OWASP
NIST SP 800-53: SI-4 Information System Monitoring
How to Stay HIPAA Compliant with Audit Logs
Microsoft – Search the audit log in the compliance portal