Home > |
Administration Guide > Audit Logging
|
---|
This chapter describes how to use audit logging to provide security audits of HSM activity. It contains the following sections:
•Configuring and Using Audit Logging
•Audit Logging General Advice and Recommendations
•Audit Log Categories and HSM Events
•Verifying the Log Entries for Another HSM
•Appliance-side HSM Audit Logging
Use this, instead of HSM secure audit logging, when you do not need the resource-heavy, maximum log security of HSM-mediated audit logging, or cannot afford it (such as when applications perform high volumes of crypto operations on the HSM).
•Appliance-side Audit Logging Compared with Secure Audit Logging