<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon
blog /
Audit Logging: Examples, Best Practices, and More

Audit Logging: Examples, Best Practices, and More

Audit logging is essential for maintaining a secure and compliant IT infrastructure. By capturing detailed records of system activities, audit logs provide insights into user actions, system events, and potential security threats. Understanding audit logging helps you identify and address vulnerabilities, ensure regulatory compliance, and enhance overall system integrity.
Cybersecurity Audit: The Ultimate Guide for 2024

Cybersecurity Audit: The Ultimate Guide for 2024

A cybersecurity audit is a comprehensive assessment of your organization's information systems, networks, and processes that identify vulnerabilities and weaknesses that cybercriminals could exploit. The audit also evaluates the effectiveness of your security controls, policies, and procedures and determines if they align with industry best practices and compliance standards.
How to Simplify Auditing Access in AWS

How to Simplify Auditing Access in AWS

Want a secure and compliant AWS environment? Then you need to audit access. Keeping tabs on who has accessed what—as well as the whens, wheres, and whys—helps you spot suspicious activities and address them promptly. Without this kind of access control, your sensitive data could be exposed to malicious actors, putting you at risk of data breaches and subsequent regulatory nightmares or service interruptions.
How to View and Check SSH Logs (Linux, Ubuntu, Debian)

How to View and Check SSH Logs (Linux, Ubuntu, Debian)

Two of the most important questions in security are: who accessed what, and when did they access it? If you have any Linux or Unix machines, you’ll likely find answers in the sshd log. sshd is the Secure Shell Daemon, which allows remote access to the system. In this article, we’ll look at how to view ssh logs.
Data Observability: Meaning, Framework & Tool Buying Guide

Data Observability: Meaning, Framework & Tool Buying Guide

Data observability can help companies understand, monitor, and manage their data across the full tech stack. In this article, you’ll learn what data observability is, the differences between data observability, monitoring, and data quality, and what information you can track with data observability. By the end of this article, you’ll discover how to implement data observability and find the right data observability tools for your organization.
The Three Pillars of Observability Explained [Side-by-Side]

The Three Pillars of Observability Explained [Side-by-Side]

In this article, we’ll focus on the three pillars of observability. You’ll learn about the definitions, strengths, and limitations of each pillar. By the end of this article, you’ll know about their individual contributions and typical real-world challenges, tying them together for an overall view of your system.
Observability vs. Monitoring: Understanding the Difference

Observability vs. Monitoring: Understanding the Difference

Observability and monitoring are often used interchangeably, but there are key differences you should know between these two IT terms and the tools that enable them. In this article, we’ll explore the relationship and differences between observability vs. monitoring. Plus, you’ll learn about what makes observability and monitoring different from telemetry and application performance monitoring (APM).
Answering Auditors’ Questions in a SOC 2 Review

Answering Auditors’ Questions in a SOC 2 Review

We recently completed our own SOC 2 audit, so we thought we’d review how we dogfooded our own product. We’ll share tips and tricks to make the audit process a little easier, whether you’re wrapping up your own or about to dive into the coming year’s audit. Here are the questions auditors asked us during our own SOC 2 audit and the commands and strongDM tooling we used to gather the evidence they requested.
How Olive AI Standardized Infrastructure Access in Order to Scale

How Olive AI Standardized Infrastructure Access in Order to Scale

During a featured session at this year’s DevOps Experience, Olive AI CloudOps Engineer Kellen Anker spoke with Justin McCarthy, strongDM CTO & Co-founder, about his company’s journey towards achieving one-click onboarding access and the resulting radical improvements in workforce efficiencies.
All Offboard! The 2024 Tech Staff Offboarding Checklist

All Offboard! The 2024 Tech Staff Offboarding Checklist

Offboarding technical employees can be a complex and arduous process with a lot of moving parts. The key to successful offboarding is to have a clear understanding of what needs to be done, who does it, and how to monitor for any shenanigans from former employees.
Forward Proxy vs. Reverse Proxy: The Difference Explained

Forward Proxy vs. Reverse Proxy: The Difference Explained

In this post, we’ll dissect the two concepts and explain how administrators can use a reverse proxy for easy access management control.
Integrate Active Directory With Any Database or Single Sign-On

Integrate Active Directory With Any Database or Single Sign-On

Consider this when you choose to integrate Active Directory (AD) with your databases and applications using their native APIs, connectors, or toolkits.
SSH Audit Made Simple

SSH Audit Made Simple

SSH audit logs allow you to determine, either retroactively or in real-time, when an unauthorized or destructive action was taken, and by whom.
What Would My SOC 2 Dashboard Look Like?

What Would My SOC 2 Dashboard Look Like?

As your organization pursues your SOC 2 certification, organization is critical. ‍You will be busy actively managing dozens of ongoing daily tasks, which can bury you in minutiae. But at the same time, you need to keep your high-level compliance goals in focus in order to successfully move your certification over the finish line.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀