Most IT/security laws, regulations and best practices require data to be held for specific periods of time, the protection, tracking and control of access and usage of sensitive information and the monitoring of logs.
Compliance with these requirements can be costly for an organization: it can create redundant processes and expenditures. Some companies buy expensive log management SIM/SIEM software and related storage to be compliant, but with limited operational value. An audit can generate a lot of manual data requests thus distracting the IT department and increasing costs…
With Logtrust, you can meet these challenges and comply with multiple regulations using the same platform.
- You don’t need to buy costly in-house storage. You only need to choose which cloud you would like to work with to be absolutely sure which legislation applies to you. Logtrust will only use the infrastructure of your chosen datacentre to collect, store, consult and correlate your data.
- You only pay for what you consume. It costs €0 in administrative personnel, maintenance, and acquisition of licenses, hardware and servers.
- You can define different retention periods for different kinds of information, thus making it easy to comply with many laws at the same time.
- Index your data in real time allowing you to search for alerts and generate reports about all of the information.
- With our powerful reporting tool you can easily demonstrate your compliance. You can create as many reports as you need.
- Comply with requirements for automatic monitoring of security events. Schedule and set alerting rules for any search.
Logtrust helps you to comply with the following laws and regulations:
- EU data retention directive (DRD)
Contact us if you need information regarding a law or regulation in your country/region: firstname.lastname@example.org
This is an international industry standard administered by the PCI Council and enforced by the sponsoring credit card brands. It defines a standard baseline level of security to be implemented to protect credit card data and it’s designed to protect cardholder data, detect security breaches and react appropriately.
Logtrust helps you comply with the following requirements:
- Requirement 7.1: limit access to computing resources and cardholder information to those individuals whose job requires such access.
- Requirement 10.2.: automated audit trails for all system components to reconstruct a number of crucial cardholder data accesses
- Requirement 10.5: Secure audit trails so that they can’t be altered. Protecting your customer data requires audit trails to be secured against tampering, especially by privileged users.
- Requirement 10.5.5: Use file integrity monitoring and change detection software on logs to ensure that existing log data cannot be changed without generating alerts
- Requirement 10.6: Review logs for all system components at least daily.
- Requirement 10.7: Retain audit trail history for at least one year, with a minimum of three months online availability.
- Requirement 11.5: Deploy file integrity monitoring software to alert personnel to the unauthorized modification of critical system or content files; and configure the software to perform critical file comparisons at least weekly.
The Federal Information Security Management ACT (FISMA) guidelines for IT system security is a comprehensive framework for securing federal government information technology.
FISMA has two primary objectives:
- Keep federal agency IT systems secure while providing electronic access for the public mandated by the E-Government Act of 2002.
- Maintain an audit trail of system activity and provide reports that document compliance.
Logstrust assists in compliance with the following areas of the framework provided by FISMA:
Information system inventorying and continuous monitoring:
Make all your machines, systems and applications report to Logtrust. Our advanced reporting tool will provide a detailed list of all your systems and keep you informed of the ones that are active/inactive, thus making it easy to demonstrate compliance.
The Logtrust monitoring application provides live statistics for all your systems and delivers alerts when certain thresholds (defined by you) are surpassed e.g.: When a system CPU is at 80% of usage for more than 15 minutes; thus guarantying the system’s availability.
Collect, store, correlate and report on your event logs and demonstrate that your controls are adequate.
Security controls and Risk assessment:
Gain complete insight into your security; pinpoint and diagnose issues, receive real time alerts on security threads (besides providing a simple mechanism to create custom alerts that suit each agency’s needs, logtrust offers a set of generic alerts and correlation libraries that can be activated as soon as the agency begins sending properly tagged logs, these generic alerts range from attack detection and geo-location to user activity tracking), correlate and manage security information and define who has access to which information with the creation of roles within our system.
The Health Insurance Portability and Accountability Act (HIPAA) is designed to protect patient (and employee data) while allowing access to the right persons at the right times so they can do their jobs. It does this by mandating accountability through use of a risk-based management approach to implement appropriate security controls.
Logtrust facilitates the following tasks:
- Addressing the requirements in the Security Rules associated with CFR Part 160 and Subparts A and C of Part 164
- Assisting with compliance of the Privacy Rule in CFR Part 160 and Subparts A and E of Part 164 that requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization by monitoring the access to information and setting alarms an reports.
- Creating audit trail for all your electronic data.
- Easily demonstrating compliance to auditors by creating reports.
The European Union’s Data Retention Directive (the “Directive”) seeks to assist law enforcement officials in their efforts to combat terrorism and to standardize disparate laws regarding data retention within the European Union (EU). The Directive requires Telecommunications companies and ISPs to retain telephone, Internet access and messaging service transaction records for a period of time between six months and two years.
The data that must be retained is the name, user ID and address of the source, as well as the destination of the communication, the date and time the communication took place, the equipment used, and the geographic location involved; not the actual content. The data may only be access through authorized request. Telecommunications companies must demonstrate compliance with the request and show who’s accessed the information.
With Logtrust you can:
- Collect, store, correlate and analyze the information with a response time of just seconds.
- Set user roles, so that only authorized individuals have access to certain information.
- Fast filter information and reports to provide requested data to government.
- Set different retention periods for different kinds of information and automatic deletion of information that surpasses the period.
Logtrust helps you comply with multiple different laws, regulations and industry standards by allowing you to customize your data collection and retention needs based on specific types of data.
Ensure compliancy with industry requirements and legal regulations regarding log data.
- Business Management
- Operations Management
- Marketing Management
- Sales Management
- Chief Information Officers
- System Administrators
- Chief Security Officers
- Security Administrators
- Vertical Apps
- Proprietary Apps
- CRM Tools
- ERP Systems