Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • Home
  • SEARCH
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 214999
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 11, 20262026-05-11T18:25:41+00:00 2026-05-11T18:25:41+00:00

I already audit authorization success, failure and logout. I’ve considered auditing (logging) every method

  • 0

I already audit authorization success, failure and logout.

I’ve considered auditing (logging) every method call and keeping a version of every row and column that was ever modified, but both of those options will greatly increase the complexity of auditing. Auditing a random subset sees too random.

The legal specs (FISMA, C&A) just say something needs to be audited.

Are there any other non-domain specific auditing strategies I’m forgetting?

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-11T18:25:41+00:00Added an answer on May 11, 2026 at 6:25 pm

    Considering that auditing is often about accountability you may wish to log those actions that could contribute to any event where someone/something needs to be accountable..

    1. Alteration of client records
    2. Alteration of configuration
    3. Deletion of Data

    It is a good idea to keep some of these things versioned, such that you can roll-back changes to vital data. Adding ‘who altered’ in the first place is quite straight forward.

    Unless someone has direct access to the database, often application logging of any event that affects the database … such as a transaction altering many tables … may be sufficient. So long as you can link auditable logical action to a logical unit of accountability, regardless of what subsystem it affects, you should be able to trace accountability.

    You should not be logging method calls and database alterations directly, but the business logic that led to those calls and changes, and who used that logic. Some small amount of backend code linking causality between calls/table alterations and some audit-message would be beneficial too (if you have resources).

    Think of your application’s audit-elements as a tree of events. The root is what you log, for example ‘Dave deleted customer record 2938’. Any children of the root can be logged and you can tie it to the root, if it is important to log it as part of the audit event. For example you can assert that some audit event, ‘Dave deleted …’ was tied to some billing information also going walkies as part of a constraint or something

    But I am not an expert.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Related Questions

I am already using Hibernate Envers to audit entities that are updated by a
Already implemented performance boosters : - Get compatible image of GraphicsConfiguration to draw on
I already know how to: Load properties files into my Spring configuration using: <context:property-placeholder
I already know the obvious answer to this question: just download <insert favorite windows
As already discussed in Lua as a general-purpose scripting language? Lua currently probably isn't
I already know Java, Objective C, C#, and some Python. I want to be
I already have a deploy.rb that can deploy my app on my production server.
We already have things like static analysis that tells us what's wrong with our
I already asked this question at the JOS-.NET board but Joel is closing that
I already used a hidden file upload control to browse file and grab the

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.