MONITORING:
Once systems are configured according to required policy, with all
applications and data files in a known and trusted state and security
and operational controls are fully active, what happens when
configuration changes occur? Two key questions need to be answered at
this point. Firstly, is the change authorised at the appropriate level?
And secondly, does the change take a system out of compliance?
Assuria
configuration change detection and event monitoring solutions provide
visibility and alerting of such changes through monitoring system event
logs for specific events and by comparing configurations against known
baselines.