Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • SEARCH
  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 214999
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 11, 20262026-05-11T18:25:41+00:00 2026-05-11T18:25:41+00:00

I already audit authorization success, failure and logout. I’ve considered auditing (logging) every method

  • 0

I already audit authorization success, failure and logout.

I’ve considered auditing (logging) every method call and keeping a version of every row and column that was ever modified, but both of those options will greatly increase the complexity of auditing. Auditing a random subset sees too random.

The legal specs (FISMA, C&A) just say something needs to be audited.

Are there any other non-domain specific auditing strategies I’m forgetting?

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-11T18:25:41+00:00Added an answer on May 11, 2026 at 6:25 pm

    Considering that auditing is often about accountability you may wish to log those actions that could contribute to any event where someone/something needs to be accountable..

    1. Alteration of client records
    2. Alteration of configuration
    3. Deletion of Data

    It is a good idea to keep some of these things versioned, such that you can roll-back changes to vital data. Adding ‘who altered’ in the first place is quite straight forward.

    Unless someone has direct access to the database, often application logging of any event that affects the database … such as a transaction altering many tables … may be sufficient. So long as you can link auditable logical action to a logical unit of accountability, regardless of what subsystem it affects, you should be able to trace accountability.

    You should not be logging method calls and database alterations directly, but the business logic that led to those calls and changes, and who used that logic. Some small amount of backend code linking causality between calls/table alterations and some audit-message would be beneficial too (if you have resources).

    Think of your application’s audit-elements as a tree of events. The root is what you log, for example ‘Dave deleted customer record 2938’. Any children of the root can be logged and you can tie it to the root, if it is important to log it as part of the audit event. For example you can assert that some audit event, ‘Dave deleted …’ was tied to some billing information also going walkies as part of a constraint or something

    But I am not an expert.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Ask A Question

Stats

  • Questions 130k
  • Answers 130k
  • Best Answers 0
  • User 1
  • Popular
  • Answers
  • Editorial Team

    How to approach applying for a job at a company ...

    • 7 Answers
  • Editorial Team

    How to handle personal stress caused by utterly incompetent and ...

    • 5 Answers
  • Editorial Team

    What is a programmer’s life like?

    • 5 Answers
  • Editorial Team
    Editorial Team added an answer You can do so using erlview, which is within the… May 12, 2026 at 6:03 am
  • Editorial Team
    Editorial Team added an answer From the Aspose Cells forums: How to use new line… May 12, 2026 at 6:03 am
  • Editorial Team
    Editorial Team added an answer I don't believe objects returned from web services expose public… May 12, 2026 at 6:03 am

Related Questions

I already audit authorization success, failure and logout. I've considered auditing (logging) every method
We're migrating MySQL to PostgreSQL. I can easily audit the schema and the SQL
I work for a CMMI level 5 certified company and one thing I hate
I can wire up Elmah to log Exceptions in my ASP.Net application and it
Scenario: I load some data into a local MySQL database each day, about 2

Trending Tags

analytics british company computer developers django employee employer english facebook french google interview javascript language life php programmer programs salary

Top Members

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.