Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Logging for Accountability

Premium room

Learn about the role accountability plays in logging and incident response.

easy

60 min

16,777

User profile photo.

To access material, start machines and answer questions login.

Logging is used to provide a "source of truth" for activity that occurs on a network. Logging is most commonly used, but not limited to incident response and security monitoring. During the incident response process, a user may be held accountable for an action or behavior, and logging plays a crucial role in proving a user's actions.

Accountability is the final pillar of the Identification, Authentication, Authorization, and Accountability () model. The model is used to protect and maintain confidentiality, , and availability of information.

Accountability holds users and peers on a network responsible for their actions. Logging is a large part of this pillar and maintains a record of activities.

To ensure the efficacy of accountability, logs and other data sources must be protected, and their authenticity must be proved. If it cannot be proven that a log was kept in its original state, it loses its for accountability and the incident response process.

Learning Objectives

  • Understand where data originates, how it is stored, and how a security engineer can leverage it.
  • Understand why accountability is important to security and how logging can help improve its efficacy.
  • Apply logs and other data sources to incident response and the principle of accountability.

Before beginning this room, we recommend you understand logging capabilities and log data sources or complete Intro to Logs. We also recommend a basic understanding of or complete Basics.

Throughout this room, we will introduce how logging and data maintain accountability. We will break down best practices and explain accountability in different stages of the incident response procedure.

Answer the questions below
Read the above before continuing to the next task.

Ready to learn Cyber Security?

The Logging for Accountability room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.