Audit Logs & Traceability
EncryptRIGHT includes flexible audit logging and reporting functionality to support traceability, alerting and compliance for visible data protection.
Audit Logs
Virtually every relevant system event can be monitored to establish detailed audit trails, and logging and reporting can be configured to meet the specific needs of an enterprise. Since every function of EncryptRIGHT requires a user ID, audit logging is always able to attribute an event to the user or entity that initiated it. EncryptRIGHT audit log files and audit log messages are sequentially numbered, hashed and encrypted to avoid tampering. When displaying the audit log files, the sequence numbers are verified to ensure that no logs or messages are missing. Notification alerts can be set to execute on a variety of triggers, such as errors related to a hash not matching after decryption, allowing better real-time data integrity.
Audit Reports
Designated users can generate reports showing every administrative change a specific user has executed or reports that identify every user that touched an item, such as a specific cryptographic key. Reports can draw from a single audit log or pull from multiple audit logs over time to provide additional visibility into an EncryptRIGHT deployment. A built-in PCI Compliance Report details the options in EncryptRIGHT that especially relate to the Payment Card Industry’s Data Security Standard (PCI-DSS) for compliance and best practices. Audit log entries may be automatically sent to an exportable file or a SYSLOG server to integrate with a Security Information and Event Management (SIEM) system for unified reporting and monitoring.
Request EncryptRIGHT Datasheet