Understand Laws and Regulations in this there are many laws that affect digital forensics investigation; for example, some jurisdictions have passed laws that require the investigator to be either a law enforcement officer or a licensed private investigator to extract the evidence. Of course, that does not prevent a forensic investigator from working with information someone else extracted or extracting evidence if the information owner gave his or her permission. It is important to be aware of the legal requirements in the jurisdiction in which you work.
Federal data Security Management Act of 2002 (FISMA):
FNMA is that the Federal data Security Management Act of 2002 that states many key security standards and guidelines, as required by congressional legislation.
FISMA emphasizes the requirement for every federal agency to develop, document, and implement an organization-wide program to supply data security for the data systems that support its operations and assets. nist SP 800-53, suggested Security Controls for Federal data Systems, was developed in support of FISMA. eleven nisi SP 800-53 is that the primary supply of suggested security controls for Federal agencies. It describes several controls associated with log management, together with the generation, review, protection, and retention of audit records, as well because the actions to be taken because of audit failure.
Related Product : Computer Hacking Forensic Investigator | CHFI
Gramm-Leach-Bliley Act (GLBA):
The Gramm-Leach-Bliley Act needs financial institutions—companies that offer shoppers financial products or services like loans, financial or investment advice, or insurance—to protect their customers’ data against security threats. Log management can be useful in identifying possible security violations and resolving them effectively.
Health Insurance portability and responsibility Act of 1996 (HIPAA):
The insurance portability and responsibility Act of 1996 (HIPAA) includes security standards health data. nist SP 800-66, associate degree Introductory Resource Guide for Implementing the health insurance portability and accountability Act (HIPAA) Security Rule, lists HIPAA-related log management desires. as an example, nist SP 800-65 describes the requirement to perform regular reviews of audit logs and access reports. in addition, it specifies that documentation of actions and activities ought to be maintained for a minimum of six years.
Sarbanes-Oxley Act (SOX) of 2002:
The Sarbanes-Oxley Act of 2002 (SOX) is an act passed by the U.S. Congress in 2002 to protect investors from the chance of fraudulent accounting activities by corporations.
Although SOX applies primarily to money and accounting practices, it conjointly encompasses the data technology (IT) functions that support these practices. SOX may be supported by reviewing logs often to look for signs of security violations, together with exploitation, still as retentive logs and records of log reviews for future review by auditors.
Also Read : Understand the Importance of Network Forensics
Payment Card industry information Security standard (PCI DSS):
The Payment Card industry information Security customary (PCI DSS) may be a proprietary data security standard for organizations that handle cardholder data for the most important debit, credit, prepaid, e-purse, ATM, and POS cards.
PCI DSS applies to organizations that “store, process, or transmit cardholder data” for credit cards. one of the wants of PCI DSS is to “track…all access to network resources and cardholder data”.
Questions related to this topic
- What logs to send to Siem?
- Is used for security event logs management?
- What security events should be logged?
- How do you protect audit logs?
- How to Understand Laws and Regulations of forensic investigation?
This Blog Article is posted by
Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092
Contact us – www.info-savvy.com