Replies: 3 comments
-
Why not log all that apply? |
Beta Was this translation helpful? Give feedback.
0 replies
-
Agree that IAM actions could often be logged as a |
Beta Was this translation helpful? Give feedback.
0 replies
-
It's a good question. I might think about two separate aspects of this:
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Proposal
There are multiple ideas about the difference between the Identity & Access Management events and the Application Activity events. Depending on the perspective of the person mapping events, they may come away with different conclusions about which event to use in specific situations. This could lead to multiple contributors or vendors mapping events in different ways, which would be confusing to event consumers.
In order to avoid this situation, we should clarify the difference between these events, and document it, including examples of situations that may be confusing as guidance for event mappers.
Ideas
Additional Concerns
Tangentially, the API Activity event could also use clarification. Many of the above IAM and Application Activity events can happen as the result of API calls. Which event is appropriate to use in that situation?
Examples
Suppose an administrator for a security-related application creates another user with specific permissions assigned. What should be logged?
Suppose an application utilizes an ABAC system for access where attributes of the subject and object are used for access control rather than direct permissions. In this application, suppose an administrator modifies something used in policy enforcement. What should be logged:
Beta Was this translation helpful? Give feedback.
All reactions