Ensure Nothing Hides. Full Visibility and Accountability
For privileged sessions, it is of course best practice to audit everything. With a documented record of all actions performed, audit logs not only can be used in forensic analysis to find exactly the issue but also to attribute actions taken to a specific user. Because these sessions are so critical, it is also best practice to keep a video recording of the session that can be reviewed or used as evidence for your most critical assets, or in highly regulated industries. There are multiple regulations including PCI-DSS for payment card data that specifically require this level of auditing. The Centrify Audit & Monitoring Service data sheet provides an overview of how customers can fulfill their compliance mandates through auditing and reporting, as well as shut down any dangerous workarounds by putting host-based monitoring in place.