Datacom Security Audit Best Practice
search cancel

Datacom Security Audit Best Practice

book

Article ID: 115102

calendar_today

Updated On:

Products

Datacom Datacom/AD Datacom/DB

Issue/Introduction

We are using external security, and want to know if there is any published security audit best practice for Datacom?

Environment

Component : Datacom/AD

Component : Datacom/DB

Resolution

Unfortunately, there is no best practice documentation for using or auditing internal or external security with Datacom. Because of the wide diversity of implementation available across different ESM products, and because there are multiple levels of implementation available, any attempt to try and define a single best practice could be rendered ineffective as soon as someone needed to configure their ESM product differently due to company practices and guidelines.
 
As a simple example, having a closed security system or an open system would lead to a totally different manner of implementation, and what might be a best practice in one would be difficult or impossible to implement in the other.
 
Consequently, we recommend that clients follow any suggested audit practices related to their ESM for use against special resources or classes and against users as defined explicitly or generically in these classes. As most of our external security definition is resource-based and not dataset-based, this would most likely provide the best results.

Additional Information

As always, please contact Broadcom support for CA Datacom if you have further questions.