Auditing and logging are key components of any security architecture. It is essential security personnel know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Cryptographic mechanisms must be used to protect the integrity of the audit tools used for audit reduction and reporting. Permanent not a finding - Auditing cannot be configured/implemented like a typical UNIX system. Remote logging (audit data included) is required. Audit tools are located on vCenter "or" wherever the syslog collector is located (it does not have to be on the same machine as vCenter. Therefore, the tools and mechanisms to protect them is the responsibility of the tools' host machine. |