Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft System Center 2012 R2 Compliance Management Cookbook

You're reading from   Microsoft System Center 2012 R2 Compliance Management Cookbook Over 40 practical recipes that will help you plan, build, implement, and enhance IT compliance policies using Microsoft Security Compliance Manager and Microsoft System Center 2012 R2

Arrow left icon
Product type Paperback
Published in Oct 2014
Publisher
ISBN-13 9781782171706
Length 284 pages
Edition 1st Edition
Arrow right icon
Toc

Table of Contents (12) Chapters Close

Preface 1. Starting the Compliance Process for Small Businesses 2. Implementing the First Steps of Basic Compliance FREE CHAPTER 3. Enhancing the Basic Compliance Program Using Microsoft System Center 2012 Configuration Manager 4. Monitoring the Basic Compliance Program 5. Starting an Enterprise Compliance Program 6. Planning a Compliance Program in Microsoft System Center 2012 7. Configuring a Compliance Program in Microsoft System Center 2012 Service Manager 8. Automating Compliance Processes with Microsoft System Center 2012 9. Reporting on Compliance with System Center 2012 A. Useful Websites and Community Resources Index

Introduction


Compliance program regulatory documents, especially data protection laws, define detection, logging, and auditing requirements. An example of such a program is the German Bundesdatenschutzgesetz (BDSG), where you would find the section "to prevent unauthorized usage of data processing systems" in paragraph 9 (http://www.lw-flyerdruck.de/userfiles/541/File/Dateivorgaben/INFO1_Januar_2011.pdf). An implication of this requirement could be to detect these unauthorized usages. Microsoft System Center 2012 Operations Manager (SCOM) has the ability to track and log unauthorized events in Microsoft Active Directory.

Another requirement could be the logging of data access for each individual user. In the Payment Card Industry Data Security Standard (PCI DSS), requirement 10 states:

"10.1 Implement audit trails to link all access to system components to each individual user"

You can find additional details on PCI DSS at https://www.pcisecuritystandards.org/documents/PCI_DSS_v3.pdf.

In this...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime