We recommend that you log data to fit your business needs, but we caution you to devise your logging plans with auditability and resource usage in mind.
Business Value:
The security administrator, through entitlement-based controls and general security configuration options, controls the amount of logging on a system. The options that are set must reflect the site's business needs.
Logging does affect performance; logging does cost in terms of processing path length, data repository size, and more. Consider this potential for overhead when deciding what logging controls to activate.
More Information:
The following sections detail several logging controls and our recommendations on how to use them.
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|