Auditing and logging are key components of the DNS architecture. It is essential for security personnel to know what is being performed on the system, where an event occurred, when an event occurred, and by whom the event was triggered, in order to compile an accurate risk assessment and appropriate forensic analysis of the event.
It is critical when the DNS is at risk of failing to process audit logs, as required, it takes specific actions (as organizationally defined) to mitigate the failure. If the system were to continue processing without auditing enabled, actions and events can take place on the system that cannot be tracked and recorded for later forensic analysis. |