Security
This section describes how to ensure physical data security according to industry best practices with regards to server and network security:
Additionally, logs can be useful for continuous analysis, or for specific investigations. Facilities are available for producing security event logs as well as query logs as described in Monitoring.
|
Refer to Authentication and authorization for information on how to manage users and their authentication and authorization. |